First published: Mon Feb 06 2017(Updated: )
An elevation of privilege vulnerability in the kernel file system could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Critical due to the possibility of a local permanent device compromise, which may require reflashing the operating system to repair the device. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-31495866.
Credit: security@android.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google Android | ||
Google Android | <=7.1.1 | |
Linux Kernel | =3.10 | |
Linux Kernel | =3.18 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-0427 is rated as Critical due to the potential for local permanent device compromise.
To mitigate CVE-2017-0427, users should update to a patched version of the Android operating system or the Linux kernel.
CVE-2017-0427 affects Google Android devices running versions up to and including 7.1.1, as well as specific versions of the Linux kernel 3.10 and 3.18.
CVE-2017-0427 enables local malicious applications to execute arbitrary code with kernel privileges.
CVE-2017-0427 is not exploitable remotely; it requires local access to the device.