The kernel in Android before 5.1.1 LMY49F and 6.0 before 2016-01-01 allows attackers to obtain sensitive information, and consequently bypass an unspecified protection mechanism, via unknown vectors, as demonstrated by obtaining Signature or SignatureOrSystem access, aka internal bug 24157888.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Android | 5.1.0 (including) | 5.1.0 (including) | |
Android | 6.0 (including) | 6.0 (including) | |
Android | 6.0.1 (including) | 6.0.1 (including) | |
Linux | Ubuntu | vivid | * |
Linux-flo | Ubuntu | trusty | * |
Linux-flo | Ubuntu | vivid | * |
Linux-flo | Ubuntu | vivid/stable-phone-overlay | * |
Linux-goldfish | Ubuntu | trusty | * |
Linux-goldfish | Ubuntu | vivid | * |
Linux-grouper | Ubuntu | trusty | * |
Linux-linaro-omap | Ubuntu | precise | * |
Linux-linaro-shared | Ubuntu | precise | * |
Linux-linaro-vexpress | Ubuntu | precise | * |
Linux-lts-quantal | Ubuntu | precise | * |
Linux-lts-raring | Ubuntu | precise | * |
Linux-lts-saucy | Ubuntu | precise | * |
Linux-maguro | Ubuntu | trusty | * |
Linux-mako | Ubuntu | trusty | * |
Linux-mako | Ubuntu | vivid | * |
Linux-mako | Ubuntu | vivid/stable-phone-overlay | * |
Linux-manta | Ubuntu | trusty | * |
Linux-manta | Ubuntu | vivid | * |
Linux-qcm-msm | Ubuntu | precise | * |