Access Restriction Bypass Affecting torvalds/linux package, versions [3.10,3.18]


Severity

Recommended
0.0
critical
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
23.55% (97th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-TORVALDSLINUX-3005571
  • published26 Jan 2022
  • disclosed7 Apr 2017
  • creditUnknown

Introduced: 7 Apr 2017

CVE-2017-0561  (opens in a new tab)
CWE-264  (opens in a new tab)

How to fix?

There is no fixed version for torvalds/linux.

Overview

Affected versions of this package are vulnerable to Access Restriction Bypass. A remote code execution vulnerability in the Broadcom Wi-Fi firmware could enable a remote attacker to execute arbitrary code within the context of the Wi-Fi SoC. This issue is rated as Critical due to the possibility of remote code execution in the context of the Wi-Fi SoC. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-34199105. References: B-RB#110814.

References

CVSS Base Scores

version 3.1