{"id":"CVE-2016-8399","details":"An elevation of privilege vulnerability in the kernel networking subsystem could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Moderate because it first requires compromising a privileged process and current compiler optimizations restrict access to the vulnerable code. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-31349935.","modified":"2026-04-16T06:17:06.285717524Z","published":"2017-01-12T15:59:01.543Z","related":["SUSE-SU-2017:0333-1","SUSE-SU-2017:0407-1","SUSE-SU-2017:0437-1","SUSE-SU-2017:0464-1","SUSE-SU-2017:0471-1","SUSE-SU-2017:0494-1","SUSE-SU-2017:1102-1"],"references":[{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2017-0817.html"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/94708"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:0869"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:2930"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2017:2931"},{"type":"ADVISORY","url":"https://source.android.com/security/bulletin/2016-12-01.html"},{"type":"ADVISORY","url":"https://support.f5.com/csp/article/K23030550?utm_source=f5support&amp%3Butm_medium=RSS"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"3.19"},{"fixed":"4.1.37"}]},{"events":[{"introduced":"4.2"},{"fixed":"4.4.38"}]},{"events":[{"introduced":"4.5"},{"fixed":"4.8.14"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-8399.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}