ID CVE-2017-13167
Summary An elevation of privilege vulnerability in the kernel sound timer. Product: Android. Versions: Android kernel. Android ID A-37240993.
References
Vulnerable Configurations
  • cpe:2.3:o:google:android:-:*:*:*:*:*:*:*
    cpe:2.3:o:google:android:-:*:*:*:*:*:*:*
CVSS
Base: 7.2 (as of 03-10-2019 - 00:03)
Impact:
Exploitability:
CWE NVD-CWE-noinfo
CAPEC
Access
VectorComplexityAuthentication
LOCAL LOW NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE COMPLETE COMPLETE
cvss-vector via4 AV:L/AC:L/Au:N/C:C/I:C/A:C
redhat via4
advisories
bugzilla
id 1383395
title CVE-2015-8956 kernel: NULL dereference in RFCOMM bind callback
oval
OR
  • comment Red Hat Enterprise Linux must be installed
    oval oval:com.redhat.rhba:tst:20070304026
  • AND
    • comment Red Hat Enterprise Linux 7 is installed
      oval oval:com.redhat.rhba:tst:20150364027
    • OR
      • comment kernel-rt earlier than 0:3.10.0-514.rt56.420.el7 is currently running
        oval oval:com.redhat.rhsa:tst:20162574031
      • comment kernel-rt earlier than 0:3.10.0-514.rt56.420.el7 is set to boot up on next boot
        oval oval:com.redhat.rhsa:tst:20162584022
    • OR
      • AND
        • comment kernel-rt is earlier than 0:3.10.0-514.rt56.420.el7
          oval oval:com.redhat.rhsa:tst:20162584001
        • comment kernel-rt is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20150727002
      • AND
        • comment kernel-rt-debug is earlier than 0:3.10.0-514.rt56.420.el7
          oval oval:com.redhat.rhsa:tst:20162584003
        • comment kernel-rt-debug is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20150727004
      • AND
        • comment kernel-rt-debug-devel is earlier than 0:3.10.0-514.rt56.420.el7
          oval oval:com.redhat.rhsa:tst:20162584005
        • comment kernel-rt-debug-devel is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20150727006
      • AND
        • comment kernel-rt-debug-kvm is earlier than 0:3.10.0-514.rt56.420.el7
          oval oval:com.redhat.rhsa:tst:20162584007
        • comment kernel-rt-debug-kvm is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20160212008
      • AND
        • comment kernel-rt-devel is earlier than 0:3.10.0-514.rt56.420.el7
          oval oval:com.redhat.rhsa:tst:20162584009
        • comment kernel-rt-devel is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20150727008
      • AND
        • comment kernel-rt-doc is earlier than 0:3.10.0-514.rt56.420.el7
          oval oval:com.redhat.rhsa:tst:20162584011
        • comment kernel-rt-doc is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20150727010
      • AND
        • comment kernel-rt-kvm is earlier than 0:3.10.0-514.rt56.420.el7
          oval oval:com.redhat.rhsa:tst:20162584013
        • comment kernel-rt-kvm is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20160212014
      • AND
        • comment kernel-rt-trace is earlier than 0:3.10.0-514.rt56.420.el7
          oval oval:com.redhat.rhsa:tst:20162584015
        • comment kernel-rt-trace is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20150727012
      • AND
        • comment kernel-rt-trace-devel is earlier than 0:3.10.0-514.rt56.420.el7
          oval oval:com.redhat.rhsa:tst:20162584017
        • comment kernel-rt-trace-devel is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20150727014
      • AND
        • comment kernel-rt-trace-kvm is earlier than 0:3.10.0-514.rt56.420.el7
          oval oval:com.redhat.rhsa:tst:20162584019
        • comment kernel-rt-trace-kvm is signed with Red Hat redhatrelease2 key
          oval oval:com.redhat.rhsa:tst:20160212020
rhsa
id RHSA-2016:2584
released 2016-11-03
severity Important
title RHSA-2016:2584: kernel-rt security, bug fix, and enhancement update (Important)
rpms
  • kernel-0:3.10.0-514.el7
  • kernel-abi-whitelists-0:3.10.0-514.el7
  • kernel-bootwrapper-0:3.10.0-514.el7
  • kernel-debug-0:3.10.0-514.el7
  • kernel-debug-debuginfo-0:3.10.0-514.el7
  • kernel-debug-devel-0:3.10.0-514.el7
  • kernel-debuginfo-0:3.10.0-514.el7
  • kernel-debuginfo-common-ppc64-0:3.10.0-514.el7
  • kernel-debuginfo-common-ppc64le-0:3.10.0-514.el7
  • kernel-debuginfo-common-s390x-0:3.10.0-514.el7
  • kernel-debuginfo-common-x86_64-0:3.10.0-514.el7
  • kernel-devel-0:3.10.0-514.el7
  • kernel-doc-0:3.10.0-514.el7
  • kernel-headers-0:3.10.0-514.el7
  • kernel-kdump-0:3.10.0-514.el7
  • kernel-kdump-debuginfo-0:3.10.0-514.el7
  • kernel-kdump-devel-0:3.10.0-514.el7
  • kernel-tools-0:3.10.0-514.el7
  • kernel-tools-debuginfo-0:3.10.0-514.el7
  • kernel-tools-libs-0:3.10.0-514.el7
  • kernel-tools-libs-devel-0:3.10.0-514.el7
  • perf-0:3.10.0-514.el7
  • perf-debuginfo-0:3.10.0-514.el7
  • python-perf-0:3.10.0-514.el7
  • python-perf-debuginfo-0:3.10.0-514.el7
  • kernel-rt-0:3.10.0-514.rt56.420.el7
  • kernel-rt-debug-0:3.10.0-514.rt56.420.el7
  • kernel-rt-debug-debuginfo-0:3.10.0-514.rt56.420.el7
  • kernel-rt-debug-devel-0:3.10.0-514.rt56.420.el7
  • kernel-rt-debug-kvm-0:3.10.0-514.rt56.420.el7
  • kernel-rt-debug-kvm-debuginfo-0:3.10.0-514.rt56.420.el7
  • kernel-rt-debuginfo-0:3.10.0-514.rt56.420.el7
  • kernel-rt-debuginfo-common-x86_64-0:3.10.0-514.rt56.420.el7
  • kernel-rt-devel-0:3.10.0-514.rt56.420.el7
  • kernel-rt-doc-0:3.10.0-514.rt56.420.el7
  • kernel-rt-kvm-0:3.10.0-514.rt56.420.el7
  • kernel-rt-kvm-debuginfo-0:3.10.0-514.rt56.420.el7
  • kernel-rt-trace-0:3.10.0-514.rt56.420.el7
  • kernel-rt-trace-debuginfo-0:3.10.0-514.rt56.420.el7
  • kernel-rt-trace-devel-0:3.10.0-514.rt56.420.el7
  • kernel-rt-trace-kvm-0:3.10.0-514.rt56.420.el7
  • kernel-rt-trace-kvm-debuginfo-0:3.10.0-514.rt56.420.el7
  • kernel-rt-1:3.10.0-514.rt56.210.el6rt
  • kernel-rt-debug-1:3.10.0-514.rt56.210.el6rt
  • kernel-rt-debug-debuginfo-1:3.10.0-514.rt56.210.el6rt
  • kernel-rt-debug-devel-1:3.10.0-514.rt56.210.el6rt
  • kernel-rt-debuginfo-1:3.10.0-514.rt56.210.el6rt
  • kernel-rt-debuginfo-common-x86_64-1:3.10.0-514.rt56.210.el6rt
  • kernel-rt-devel-1:3.10.0-514.rt56.210.el6rt
  • kernel-rt-doc-1:3.10.0-514.rt56.210.el6rt
  • kernel-rt-firmware-1:3.10.0-514.rt56.210.el6rt
  • kernel-rt-trace-1:3.10.0-514.rt56.210.el6rt
  • kernel-rt-trace-debuginfo-1:3.10.0-514.rt56.210.el6rt
  • kernel-rt-trace-devel-1:3.10.0-514.rt56.210.el6rt
  • kernel-rt-vanilla-1:3.10.0-514.rt56.210.el6rt
  • kernel-rt-vanilla-debuginfo-1:3.10.0-514.rt56.210.el6rt
  • kernel-rt-vanilla-devel-1:3.10.0-514.rt56.210.el6rt
refmap via4
confirm https://source.android.com/security/bulletin/pixel/2017-12-01
suse SUSE-SU-2018:0011
Last major update 03-10-2019 - 00:03
Published 06-12-2017 - 14:29
Last modified 03-10-2019 - 00:03
Back to Top