First published: Mon Feb 06 2017(Updated: )
An elevation of privilege vulnerability in the Qualcomm Wi-Fi driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-32450647. References: QC-CR#1092059.
Credit: security@android.com
Affected Software | Affected Version | How to fix |
---|---|---|
Android | <=7.1.1 | |
Linux kernel | =3.10 | |
Linux kernel | =3.18 | |
Android | ||
Linux Kernel | =3.10 | |
Linux Kernel | =3.18 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-0439 is rated as High due to its ability to allow local malicious applications to execute arbitrary code within the kernel context.
To mitigate CVE-2017-0439, update your Android device or Linux kernel to a version that has patched this vulnerability.
CVE-2017-0439 affects Android versions up to 7.1.1 and the Linux kernel versions 3.10 and 3.18.
CVE-2017-0439 is classified as an elevation of privilege vulnerability in the Qualcomm Wi-Fi driver.
CVE-2017-0439 requires a local malicious application to exploit the vulnerability, hence it cannot be exploited remotely.