In sk_clone_lock of sock.c, there is a possible memory corruption due to type confusion. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android kernel. Android ID: A-113509306. References: Upstream kernel.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
EUVD-2018-21162 | In sk_clone_lock of sock.c, there is a possible memory corruption due to type confusion. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android kernel. Android ID: A-113509306. References: Upstream kernel. |
![]() |
USN-3880-1 | Linux kernel vulnerabilities |
![]() |
USN-3880-2 | Linux kernel (Trusty HWE) vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.

Status: PUBLISHED
Assigner: google_android
Published:
Updated: 2024-08-05T07:24:56.108Z
Reserved: 2018-04-05T00:00:00
Link: CVE-2018-9568

No data.

Status : Modified
Published: 2018-12-06T14:29:01.860
Modified: 2024-11-21T04:15:43.270
Link: CVE-2018-9568


No data.