You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The LIST_POISON feature in include/linux/poison.h in the Linux kernel before 4.3, as used in Android 6.0.1 before 2016-03-01, does not properly consider the relationship to the mmap_min_addr value, which makes it easier for attackers to bypass a poison-pointer protection mechanism by triggering the use of an uninitialized list entry, aka Android internal bug 26186802, a different vulnerability than CVE-2015-3636.
CVE-2016-0821 - High Severity Vulnerability
Vulnerable Library - linuxlinux-3.13.5
Apache Software Foundation (ASF)
Library home page: https://mirrors.edge.kernel.org/pub/linux/kernel/v3.0/?wsslib=linux
Found in HEAD commit: 439d18b77a020411b95770ba08a9229eed466cde
Found in base branch: xsentinel-1.6-clean
Vulnerable Source Files (3)
android_kernel_samsung_j7xlte/include/linux/poison.h
android_kernel_samsung_j7xlte/include/linux/poison.h
android_kernel_samsung_j7xlte/include/linux/poison.h
Vulnerability Details
The LIST_POISON feature in include/linux/poison.h in the Linux kernel before 4.3, as used in Android 6.0.1 before 2016-03-01, does not properly consider the relationship to the mmap_min_addr value, which makes it easier for attackers to bypass a poison-pointer protection mechanism by triggering the use of an uninitialized list entry, aka Android internal bug 26186802, a different vulnerability than CVE-2015-3636.
Publish Date: 2016-03-12
URL: CVE-2016-0821
CVSS 3 Score Details (7.5)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://nvd.nist.gov/vuln/detail/CVE-2016-0821
Release Date: 2016-03-12
Fix Resolution: 4.3
Step up your Open Source Security Game with WhiteSource here
The text was updated successfully, but these errors were encountered: