Revision Date: | 2016-07-10 | Version: | 1 | Title: | CVE-2016-3762 on Ubuntu 16.04 LTS (xenial) - untriaged. | Description: | The sockets subsystem in Android 5.0.x before 5.0.2, 5.1.x before 5.1.1, and 6.x before 2016-07-01 allows attackers to gain privileges via a crafted application that uses (1) the AF_MSM_IPC socket class or (2) another socket class that is unrecognized by SELinux, aka internal bug 28612709.
| Family: | unix | Class: | vulnerability | Status: | | Reference(s): | CVE-2016-3762
| Platform(s): | Ubuntu 16.04 LTS
| Product(s): | | Definition Synopsis | Ubuntu 16.04 LTS (xenial) is installed. AND Package Information
NOT android package in xenial, while related to the CVE in some way, is not affected (note: 'SELinux policy not used').
OR NOT android-copyright package in xenial, while related to the CVE in some way, is not affected (note: 'SELinux policy not used').
OR NOT android-emulator package in xenial, while related to the CVE in some way, is not affected (note: 'SELinux policy not used').
OR NOT ubuntu-emulator-images package in xenial, while related to the CVE in some way, is not affected (note: 'SELinux policy not used').
OR NOT ubuntu-emulator-runtime package in xenial, while related to the CVE in some way, is not affected (note: 'SELinux policy not used').
|
|