{"id":"UBUNTU-CVE-2017-0564","details":"An elevation of privilege vulnerability in the kernel ION subsystem could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Critical due to the possibility of a local permanent device compromise, which may require reflashing the operating system to repair the device. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-34276203.","modified":"2026-02-04T04:36:51.018563Z","published":"2017-04-07T22:59:00Z","withdrawn":"2025-06-23T15:52:51Z","related":["CVE-2017-0564"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-0564"},{"type":"REPORT","url":"https://source.android.com/security/bulletin/2017-04-01"},{"type":"REPORT","url":"https://source.android.com/security/bulletin/2017-12-01"},{"type":"REPORT","url":"https://github.com/MoKee/android_kernel_samsung_apq8084/commit/354a16e101d7e9a1e06a44850a5d297ae132ce61"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2017-0564"}],"affected":[{"package":{"name":"linux-flo","ecosystem":"Ubuntu:Pro:16.04:LTS","purl":"pkg:deb/ubuntu/linux-flo@3.4.0-5.23?arch=source&distro=esm-apps/xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["3.4.0-5.19","3.4.0-5.22","3.4.0-5.23"],"ecosystem_specific":{"ubuntu_priority":"medium"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2017/UBUNTU-CVE-2017-0564.json"}},{"package":{"name":"linux-goldfish","ecosystem":"Ubuntu:Pro:16.04:LTS","purl":"pkg:deb/ubuntu/linux-goldfish@3.4.0-4.27?arch=source&distro=esm-apps/xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["3.4.0-4.24","3.4.0-4.26","3.4.0-4.27"],"ecosystem_specific":{"ubuntu_priority":"medium"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2017/UBUNTU-CVE-2017-0564.json"}},{"package":{"name":"linux-mako","ecosystem":"Ubuntu:Pro:16.04:LTS","purl":"pkg:deb/ubuntu/linux-mako@3.4.0-7.44?arch=source&distro=esm-apps/xenial"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["3.4.0-7.39","3.4.0-7.40","3.4.0-7.41","3.4.0-7.44"],"ecosystem_specific":{"ubuntu_priority":"medium"},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2017/UBUNTU-CVE-2017-0564.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}]}