# |
CVE ID
|
CWE ID
|
# of Exploits
|
Vulnerability Type(s)
|
Publish Date
|
Update Date
|
Score
|
Gained Access Level
|
Access
|
Complexity
|
Authentication
|
Conf.
|
Integ.
|
Avail.
|
251 |
CVE-2016-8463 |
399 |
|
DoS |
2017-01-12 |
2017-01-17 |
7.1 |
None |
Remote |
Medium |
Not required |
None |
None |
Complete |
A denial of service vulnerability in the Qualcomm FUSE file system could enable a remote attacker to use a specially crafted file to cause a device hang or reboot. This issue is rated as High due to the possibility of remote denial of service. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-30786860. References: QC-CR#586855. |
252 |
CVE-2016-8458 |
264 |
|
Exec Code |
2017-01-12 |
2017-01-23 |
7.6 |
None |
Remote |
High |
Not required |
Complete |
Complete |
Complete |
An elevation of privilege vulnerability in the Synaptics touchscreen driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-31968442. |
253 |
CVE-2016-8457 |
264 |
|
Exec Code |
2017-01-12 |
2017-01-23 |
7.6 |
None |
Remote |
High |
Not required |
Complete |
Complete |
Complete |
An elevation of privilege vulnerability in the Broadcom Wi-Fi driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-32219453. References: B-RB#106116. |
254 |
CVE-2016-8456 |
264 |
|
Exec Code |
2017-01-12 |
2017-01-23 |
7.6 |
None |
Remote |
High |
Not required |
Complete |
Complete |
Complete |
An elevation of privilege vulnerability in the Broadcom Wi-Fi driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-32219255. References: B-RB#105580. |
255 |
CVE-2016-8454 |
264 |
|
Exec Code |
2017-01-12 |
2017-01-17 |
7.6 |
None |
Remote |
High |
Not required |
Complete |
Complete |
Complete |
An elevation of privilege vulnerability in the Broadcom Wi-Fi driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-32174590. References: B-RB#107142. |
256 |
CVE-2016-8453 |
264 |
|
Exec Code |
2017-01-12 |
2017-01-17 |
7.6 |
None |
Remote |
High |
Not required |
Complete |
Complete |
Complete |
An elevation of privilege vulnerability in the Broadcom Wi-Fi driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10. Android ID: A-24739315. References: B-RB#73392. |
257 |
CVE-2016-8452 |
264 |
|
Exec Code |
2017-01-12 |
2017-01-17 |
7.6 |
None |
Remote |
High |
Not required |
Complete |
Complete |
Complete |
An elevation of privilege vulnerability in the Qualcomm Wi-Fi driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-32506396. References: QC-CR#1050323. |
258 |
CVE-2016-8451 |
264 |
|
Exec Code |
2017-01-12 |
2017-01-18 |
7.6 |
None |
Remote |
High |
Not required |
Complete |
Complete |
Complete |
An elevation of privilege vulnerability in the Synaptics touchscreen driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.4. Android ID: A-32178033. |
259 |
CVE-2016-8450 |
264 |
|
Exec Code |
2017-01-12 |
2017-01-17 |
7.6 |
None |
Remote |
High |
Not required |
Complete |
Complete |
Complete |
An elevation of privilege vulnerability in the Qualcomm sound driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10. Android ID: A-32450563. References: QC-CR#880388. |
260 |
CVE-2016-8449 |
264 |
|
Exec Code |
2017-01-12 |
2017-10-18 |
7.6 |
None |
Remote |
High |
Not required |
Complete |
Complete |
Complete |
An elevation of privilege vulnerability in the NVIDIA GPU driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10. Android ID: A-31798848. References: N-CVE-2016-8449. |
261 |
CVE-2016-8444 |
284 |
|
Exec Code |
2017-01-12 |
2017-01-23 |
7.6 |
None |
Remote |
High |
Not required |
Complete |
Complete |
Complete |
An elevation of privilege vulnerability in the Qualcomm camera could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10. Android ID: A-31243641. References: QC-CR#1074310. |
262 |
CVE-2016-8443 |
285 |
|
|
2017-01-12 |
2017-01-23 |
7.2 |
None |
Local |
Low |
Not required |
Complete |
Complete |
Complete |
Possible unauthorized memory access in the hypervisor. Incorrect configuration provides access to subsystem page tables. Product: Android. Versions: Kernel 3.18. Android ID: A-32576499. References: QC-CR#964185. |
263 |
CVE-2016-8442 |
20 |
|
|
2017-01-12 |
2017-01-23 |
7.2 |
None |
Local |
Low |
Not required |
Complete |
Complete |
Complete |
Possible unauthorized memory access in the hypervisor. Lack of input validation could allow hypervisor memory to be accessed by the HLOS. Product: Android. Versions: Kernel 3.18. Android ID: A-31625910. QC-CR#1038173. |
264 |
CVE-2016-8441 |
119 |
|
Overflow |
2017-01-12 |
2017-01-23 |
7.2 |
None |
Local |
Low |
Not required |
Complete |
Complete |
Complete |
Possible buffer overflow in the hypervisor. Inappropriate usage of a static array could lead to a buffer overrun. Product: Android. Versions: Kernel 3.18. Android ID: A-31625904. References: QC-CR#1027769. |
265 |
CVE-2016-8421 |
264 |
|
Exec Code |
2017-02-08 |
2017-07-24 |
7.6 |
None |
Remote |
High |
Not required |
Complete |
Complete |
Complete |
An elevation of privilege vulnerability in the Qualcomm Wi-Fi driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-32451104. References: QC-CR#1087797. |
266 |
CVE-2016-8420 |
264 |
|
Exec Code |
2017-02-08 |
2017-07-24 |
7.6 |
None |
Remote |
High |
Not required |
Complete |
Complete |
Complete |
An elevation of privilege vulnerability in the Qualcomm Wi-Fi driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-32451171. References: QC-CR#1087807. |
267 |
CVE-2016-8419 |
264 |
|
Exec Code |
2017-02-08 |
2017-07-24 |
7.6 |
None |
Remote |
High |
Not required |
Complete |
Complete |
Complete |
An elevation of privilege vulnerability in the Qualcomm Wi-Fi driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-32454494. References: QC-CR#1087209. |
268 |
CVE-2016-8417 |
264 |
|
Exec Code |
2017-03-07 |
2017-07-17 |
7.6 |
None |
Remote |
High |
Not required |
Complete |
Complete |
Complete |
An elevation of privilege vulnerability in the Qualcomm camera driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Moderate because it first requires compromising a privileged process and is mitigated by current platform configurations. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-32342399. References: QC-CR#1088824. |
269 |
CVE-2016-8415 |
284 |
|
Exec Code |
2017-01-12 |
2017-01-17 |
7.6 |
None |
Remote |
High |
Not required |
Complete |
Complete |
Complete |
An elevation of privilege vulnerability in the Qualcomm Wi-Fi driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-31750554. References: QC-CR#1079596. |
270 |
CVE-2016-8412 |
284 |
|
Exec Code |
2017-01-12 |
2017-01-17 |
7.6 |
None |
Remote |
High |
Not required |
Complete |
Complete |
Complete |
An elevation of privilege vulnerability in the Qualcomm camera could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-31225246. References: QC-CR#1071891. |
271 |
CVE-2016-8399 |
284 |
|
Exec Code |
2017-01-12 |
2018-01-04 |
7.6 |
None |
Remote |
High |
Not required |
Complete |
Complete |
Complete |
An elevation of privilege vulnerability in the kernel networking subsystem could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Moderate because it first requires compromising a privileged process and current compiler optimizations restrict access to the vulnerable code. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-31349935. |
272 |
CVE-2016-8395 |
|
|
DoS |
2017-01-12 |
2017-10-18 |
7.1 |
None |
Remote |
Medium |
Not required |
None |
None |
Complete |
A denial of service vulnerability in the NVIDIA camera driver could enable an attacker to cause a local permanent denial of service, which may require reflashing the operating system to repair the device. This issue is rated as High due to the possibility of local permanent denial of service. Product: Android. Versions: Kernel-3.10. Android ID: A-31403040. References: N-CVE-2016-8395. |
273 |
CVE-2016-8394 |
284 |
|
Exec Code |
2017-01-12 |
2017-01-17 |
7.6 |
None |
Remote |
High |
Not required |
Complete |
Complete |
Complete |
An elevation of privilege vulnerability in the Synaptics touchscreen driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10. Android ID: A-31913197. |
274 |
CVE-2016-8393 |
284 |
|
Exec Code |
2017-01-12 |
2017-01-17 |
7.6 |
None |
Remote |
High |
Not required |
Complete |
Complete |
Complete |
An elevation of privilege vulnerability in the Synaptics touchscreen driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10. Android ID: A-31911920. |
275 |
CVE-2016-8392 |
284 |
|
Exec Code |
2017-01-12 |
2017-01-17 |
7.6 |
None |
Remote |
High |
Not required |
Complete |
Complete |
Complete |
An elevation of privilege vulnerability in the Qualcomm sound driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-31385862. References: QC-CR#1073136. |
276 |
CVE-2016-8391 |
284 |
|
Exec Code |
2017-01-12 |
2017-01-17 |
7.6 |
None |
Remote |
High |
Not required |
Complete |
Complete |
Complete |
An elevation of privilege vulnerability in the Qualcomm sound driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-31253255. References: QC-CR#1072166. |
277 |
CVE-2016-7914 |
125 |
|
DoS +Info |
2016-11-16 |
2018-01-04 |
7.1 |
None |
Remote |
Medium |
Not required |
Complete |
None |
None |
The assoc_array_insert_into_terminal_node function in lib/assoc_array.c in the Linux kernel before 4.5.3 does not check whether a slot is a leaf, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (invalid pointer dereference and out-of-bounds read) via an application that uses associative-array data structures, as demonstrated by the keyutils test suite. |
278 |
CVE-2016-7425 |
119 |
|
DoS Overflow +Priv |
2016-10-16 |
2017-01-06 |
7.2 |
None |
Local |
Low |
Not required |
Complete |
Complete |
Complete |
The arcmsr_iop_message_xfer function in drivers/scsi/arcmsr/arcmsr_hba.c in the Linux kernel through 4.8.2 does not restrict a certain length field, which allows local users to gain privileges or cause a denial of service (heap-based buffer overflow) via an ARCMSR_MESSAGE_WRITE_WQBUFFER control code. |
279 |
CVE-2016-7039 |
399 |
|
DoS |
2016-10-16 |
2018-01-04 |
7.8 |
None |
Remote |
Low |
Not required |
None |
None |
Complete |
The IP stack in the Linux kernel through 4.8.2 allows remote attackers to cause a denial of service (stack consumption and panic) or possibly have unspecified other impact by triggering use of the GRO path for large crafted packets, as demonstrated by packets that contain only VLAN headers, a related issue to CVE-2016-8666. |
280 |
CVE-2016-6791 |
284 |
|
Exec Code |
2017-01-12 |
2017-01-17 |
7.6 |
None |
Remote |
High |
Not required |
Complete |
Complete |
Complete |
An elevation of privilege vulnerability in the Qualcomm sound driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-31252384. References: QC-CR#1071809. |
281 |
CVE-2016-6780 |
284 |
|
Exec Code |
2017-01-12 |
2017-01-19 |
7.6 |
None |
Remote |
High |
Not required |
Complete |
Complete |
Complete |
An elevation of privilege vulnerability in the HTC sound codec driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10. Android ID: A-31251496. |
282 |
CVE-2016-6779 |
284 |
|
Exec Code |
2017-01-12 |
2017-01-19 |
7.6 |
None |
Remote |
High |
Not required |
Complete |
Complete |
Complete |
An elevation of privilege vulnerability in the HTC sound codec driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10. Android ID: A-31386004. |
283 |
CVE-2016-6778 |
284 |
|
Exec Code |
2017-01-12 |
2017-01-19 |
7.6 |
None |
Remote |
High |
Not required |
Complete |
Complete |
Complete |
An elevation of privilege vulnerability in the HTC sound codec driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10. Android ID: A-31384646. |
284 |
CVE-2016-6755 |
284 |
|
Exec Code |
2017-01-12 |
2017-01-17 |
7.6 |
None |
Remote |
High |
Not required |
Complete |
Complete |
Complete |
An elevation of privilege vulnerability in the Qualcomm camera driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-30740545. References: QC-CR#1065916. |
285 |
CVE-2016-6187 |
119 |
|
Overflow +Priv |
2016-08-06 |
2016-11-28 |
7.2 |
None |
Local |
Low |
Not required |
Complete |
Complete |
Complete |
The apparmor_setprocattr function in security/apparmor/lsm.c in the Linux kernel before 4.6.5 does not validate the buffer size, which allows local users to gain privileges by triggering an AppArmor setprocattr hook. |
286 |
CVE-2016-5856 |
264 |
|
+Priv |
2017-04-12 |
2017-04-19 |
7.6 |
None |
Remote |
High |
Not required |
Complete |
Complete |
Complete |
Drivers/soc/qcom/spcom.c in the Qualcomm SPCom driver in the Android kernel 2017-03-05 allows local users to gain privileges, a different vulnerability than CVE-2016-5857. |
287 |
CVE-2016-5829 |
119 |
|
DoS Overflow |
2016-06-27 |
2018-01-04 |
7.2 |
None |
Local |
Low |
Not required |
Complete |
Complete |
Complete |
Multiple heap-based buffer overflows in the hiddev_ioctl_usage function in drivers/hid/usbhid/hiddev.c in the Linux kernel through 4.6.3 allow local users to cause a denial of service or possibly have unspecified other impact via a crafted (1) HIDIOCGUSAGES or (2) HIDIOCSUSAGES ioctl call. |
288 |
CVE-2016-5828 |
20 |
|
DoS |
2016-06-27 |
2018-01-04 |
7.2 |
None |
Local |
Low |
Not required |
Complete |
Complete |
Complete |
The start_thread function in arch/powerpc/kernel/process.c in the Linux kernel through 4.6.3 on powerpc platforms mishandles transactional state, which allows local users to cause a denial of service (invalid process state or TM Bad Thing exception, and system crash) or possibly have unspecified other impact by starting and suspending a transaction before an exec system call. |
289 |
CVE-2016-5343 |
119 |
|
DoS Overflow Mem. Corr. |
2016-10-10 |
2016-11-28 |
7.5 |
None |
Remote |
Low |
Not required |
Partial |
Partial |
Partial |
drivers/soc/qcom/qdsp6v2/voice_svc.c in the QDSP6v2 Voice Service driver for the Linux kernel 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, allows attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a write request, as demonstrated by a voice_svc_send_req buffer overflow. |
290 |
CVE-2016-5342 |
119 |
|
DoS Overflow |
2016-08-30 |
2016-11-28 |
7.2 |
None |
Local |
Low |
Not required |
Complete |
Complete |
Complete |
Heap-based buffer overflow in the wcnss_wlan_write function in drivers/net/wireless/wcnss/wcnss_wlan.c in the wcnss_wlan device driver for the Linux kernel 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, allows attackers to cause a denial of service or possibly have unspecified other impact by writing to /dev/wcnss_wlan with an unexpected amount of data. |
291 |
CVE-2016-5340 |
20 |
|
Bypass |
2016-08-07 |
2017-08-12 |
7.2 |
None |
Local |
Low |
Not required |
Complete |
Complete |
Complete |
The is_ashmem_file function in drivers/staging/android/ashmem.c in a certain Qualcomm Innovation Center (QuIC) Android patch for the Linux kernel 3.x mishandles pointer validation within the KGSL Linux Graphics Module, which allows attackers to bypass intended access restrictions by using the /ashmem string as the dentry name. |
292 |
CVE-2016-5195 |
362 |
|
+Priv |
2016-11-10 |
2018-11-30 |
7.2 |
None |
Local |
Low |
Not required |
Complete |
Complete |
Complete |
Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka "Dirty COW." |
293 |
CVE-2016-4997 |
264 |
|
DoS +Priv Mem. Corr. |
2016-07-03 |
2018-01-04 |
7.2 |
None |
Local |
Low |
Not required |
Complete |
Complete |
Complete |
The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel before 4.6.3 allow local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement. |
294 |
CVE-2016-4951 |
|
|
DoS |
2016-05-23 |
2016-11-28 |
7.2 |
None |
Local |
Low |
Not required |
Complete |
Complete |
Complete |
The tipc_nl_publ_dump function in net/tipc/socket.c in the Linux kernel through 4.6 does not verify socket existence, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact via a dumpit operation. |
295 |
CVE-2016-4913 |
200 |
|
+Info |
2016-05-23 |
2018-10-31 |
7.2 |
None |
Local |
Low |
Not required |
Complete |
Complete |
Complete |
The get_rock_ridge_filename function in fs/isofs/rock.c in the Linux kernel before 4.5.5 mishandles NM (aka alternate name) entries containing \0 characters, which allows local users to obtain sensitive information from kernel memory or possibly have unspecified other impact via a crafted isofs filesystem. |
296 |
CVE-2016-4805 |
416 |
|
DoS Mem. Corr. |
2016-05-23 |
2017-08-12 |
7.2 |
None |
Local |
Low |
Not required |
Complete |
Complete |
Complete |
Use-after-free vulnerability in drivers/net/ppp/ppp_generic.c in the Linux kernel before 4.5.2 allows local users to cause a denial of service (memory corruption and system crash, or spinlock) or possibly have unspecified other impact by removing a network namespace, related to the ppp_register_net_channel and ppp_unregister_channel functions. |
297 |
CVE-2016-4794 |
|
|
DoS |
2016-05-23 |
2018-01-04 |
7.2 |
None |
Local |
Low |
Not required |
Complete |
Complete |
Complete |
Use-after-free vulnerability in mm/percpu.c in the Linux kernel through 4.6 allows local users to cause a denial of service (BUG) or possibly have unspecified other impact via crafted use of the mmap and bpf system calls. |
298 |
CVE-2016-4568 |
119 |
|
DoS Overflow |
2016-05-23 |
2016-05-24 |
7.2 |
None |
Local |
Low |
Not required |
Complete |
Complete |
Complete |
drivers/media/v4l2-core/videobuf2-v4l2.c in the Linux kernel before 4.5.3 allows local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a crafted number of planes in a VIDIOC_DQBUF ioctl call. |
299 |
CVE-2016-4565 |
264 |
|
DoS |
2016-05-23 |
2018-01-04 |
7.2 |
None |
Local |
Low |
Not required |
Complete |
Complete |
Complete |
The InfiniBand (aka IB) stack in the Linux kernel before 4.5.3 incorrectly relies on the write system call, which allows local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a uAPI interface. |
300 |
CVE-2016-4557 |
|
|
DoS +Priv |
2016-05-23 |
2017-09-02 |
7.2 |
None |
Local |
Low |
Not required |
Complete |
Complete |
Complete |
The replace_map_fd_with_map_ptr function in kernel/bpf/verifier.c in the Linux kernel before 4.5.5 does not properly maintain an fd data structure, which allows local users to gain privileges or cause a denial of service (use-after-free) via crafted BPF instructions that reference an incorrect file descriptor. |