First published: Wed Dec 04 2024(Updated: )
In __unregister_prot_hook and packet_release of af_packet.c, there is a possible use-after-free due to improper locking. This could lead to local escalation of privilege in the kernel with System execution privileges needed. User interaction is not needed for exploitation.
Credit: security@android.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google Android |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2018-9439 is considered high due to the potential for local escalation of privileges in the kernel.
CVE-2018-9439 affects certain versions of Google Android, but specific version details should be checked in the latest security bulletins.
To fix CVE-2018-9439, users should update their Android devices to the latest security patch provided by the manufacturer.
No, user interaction is not needed for the exploitation of CVE-2018-9439, making it more critical.
The potential impact of CVE-2018-9439 includes local escalation of privileges, which can allow unauthorized access to system-level operations.