First published: Mon Nov 07 2016(Updated: )
Last updated 24 July 2024
Credit: security@android.com security@android.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Linux kernel | <3.2.85 | |
Linux Linux kernel | >=3.3<3.10.107 | |
Linux Linux kernel | >=3.11<3.12.70 | |
Linux Linux kernel | >=3.13<3.16.37 | |
Linux Linux kernel | >=3.17<3.18.38 | |
Linux Linux kernel | >=3.19<4.1.29 | |
Linux Linux kernel | >=4.2<4.4.17 | |
Linux Linux kernel | >=4.5<4.6.6 | |
Google Android | ||
debian/linux | 5.10.223-1 5.10.226-1 6.1.115-1 6.1.119-1 6.11.10-1 6.12.5-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2016-7911 is critical.
CVE-2016-7911 allows local users to gain privileges or cause a denial of service (use-after-free) in Linux kernels.
The remedy for CVE-2016-7911 in Ubuntu is to update to Linux kernel version 3.2.0-122.165, 3.13.0-109.156, or 4.4.0-38.57.
The remedy for CVE-2016-7911 in Google Android is to update to Linux kernel version 4.19.249-2, 4.19.289-2, 5.10.178-3, 5.10.191-1, 6.1.38-1, 6.1.52-1, or 6.5.3-1.
You can find more information about CVE-2016-7911 in the references provided: http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8ba8682107ee2ca3347354e018865d8e1967c5f4, http://source.android.com/security/bulletin/2016-11-01.html, http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.6.6.