{"containers":{"cna":{"affected":[{"product":"Android","vendor":"Google Inc.","versions":[{"status":"affected","version":"Android kernel"}]}],"datePublic":"2018-12-06T00:00:00.000Z","descriptions":[{"lang":"en","value":"In sk_clone_lock of sock.c, there is a possible memory corruption due to type confusion. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android kernel. Android ID: A-113509306. References: Upstream kernel."}],"problemTypes":[{"descriptions":[{"description":"Elevation of privilege","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2019-12-17T13:06:02.000Z","orgId":"baff130e-b8d5-4e15-b3d3-c3cf5d5545c6","shortName":"google_android"},"references":[{"name":"RHSA-2019:0512","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"https://access.redhat.com/errata/RHSA-2019:0512"},{"name":"USN-3880-1","tags":["vendor-advisory","x_refsource_UBUNTU"],"url":"https://usn.ubuntu.com/3880-1/"},{"name":"USN-3880-2","tags":["vendor-advisory","x_refsource_UBUNTU"],"url":"https://usn.ubuntu.com/3880-2/"},{"name":"RHSA-2019:0514","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"https://access.redhat.com/errata/RHSA-2019:0514"},{"tags":["x_refsource_CONFIRM"],"url":"https://source.android.com/security/bulletin/2018-12-01"},{"name":"RHSA-2019:2696","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"https://access.redhat.com/errata/RHSA-2019:2696"},{"name":"RHSA-2019:2730","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"https://access.redhat.com/errata/RHSA-2019:2730"},{"name":"RHSA-2019:2736","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"https://access.redhat.com/errata/RHSA-2019:2736"},{"name":"RHSA-2019:3967","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"https://access.redhat.com/errata/RHSA-2019:3967"},{"name":"RHSA-2019:4056","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"https://access.redhat.com/errata/RHSA-2019:4056"},{"name":"RHSA-2019:4159","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"https://access.redhat.com/errata/RHSA-2019:4159"},{"name":"RHSA-2019:4164","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"https://access.redhat.com/errata/RHSA-2019:4164"},{"name":"RHSA-2019:4255","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"https://access.redhat.com/errata/RHSA-2019:4255"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"security@android.com","ID":"CVE-2018-9568","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Android","version":{"version_data":[{"version_value":"Android kernel"}]}}]},"vendor_name":"Google Inc."}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"In sk_clone_lock of sock.c, there is a possible memory corruption due to type confusion. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android kernel. Android ID: A-113509306. References: Upstream kernel."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Elevation of privilege"}]}]},"references":{"reference_data":[{"name":"RHSA-2019:0512","refsource":"REDHAT","url":"https://access.redhat.com/errata/RHSA-2019:0512"},{"name":"USN-3880-1","refsource":"UBUNTU","url":"https://usn.ubuntu.com/3880-1/"},{"name":"USN-3880-2","refsource":"UBUNTU","url":"https://usn.ubuntu.com/3880-2/"},{"name":"RHSA-2019:0514","refsource":"REDHAT","url":"https://access.redhat.com/errata/RHSA-2019:0514"},{"name":"https://source.android.com/security/bulletin/2018-12-01","refsource":"CONFIRM","url":"https://source.android.com/security/bulletin/2018-12-01"},{"name":"RHSA-2019:2696","refsource":"REDHAT","url":"https://access.redhat.com/errata/RHSA-2019:2696"},{"name":"RHSA-2019:2730","refsource":"REDHAT","url":"https://access.redhat.com/errata/RHSA-2019:2730"},{"name":"RHSA-2019:2736","refsource":"REDHAT","url":"https://access.redhat.com/errata/RHSA-2019:2736"},{"name":"RHSA-2019:3967","refsource":"REDHAT","url":"https://access.redhat.com/errata/RHSA-2019:3967"},{"name":"RHSA-2019:4056","refsource":"REDHAT","url":"https://access.redhat.com/errata/RHSA-2019:4056"},{"name":"RHSA-2019:4159","refsource":"REDHAT","url":"https://access.redhat.com/errata/RHSA-2019:4159"},{"name":"RHSA-2019:4164","refsource":"REDHAT","url":"https://access.redhat.com/errata/RHSA-2019:4164"},{"name":"RHSA-2019:4255","refsource":"REDHAT","url":"https://access.redhat.com/errata/RHSA-2019:4255"}]}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-05T07:24:56.108Z"},"title":"CVE Program Container","references":[{"name":"RHSA-2019:0512","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"https://access.redhat.com/errata/RHSA-2019:0512"},{"name":"USN-3880-1","tags":["vendor-advisory","x_refsource_UBUNTU","x_transferred"],"url":"https://usn.ubuntu.com/3880-1/"},{"name":"USN-3880-2","tags":["vendor-advisory","x_refsource_UBUNTU","x_transferred"],"url":"https://usn.ubuntu.com/3880-2/"},{"name":"RHSA-2019:0514","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"https://access.redhat.com/errata/RHSA-2019:0514"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://source.android.com/security/bulletin/2018-12-01"},{"name":"RHSA-2019:2696","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"https://access.redhat.com/errata/RHSA-2019:2696"},{"name":"RHSA-2019:2730","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"https://access.redhat.com/errata/RHSA-2019:2730"},{"name":"RHSA-2019:2736","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"https://access.redhat.com/errata/RHSA-2019:2736"},{"name":"RHSA-2019:3967","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"https://access.redhat.com/errata/RHSA-2019:3967"},{"name":"RHSA-2019:4056","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"https://access.redhat.com/errata/RHSA-2019:4056"},{"name":"RHSA-2019:4159","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"https://access.redhat.com/errata/RHSA-2019:4159"},{"name":"RHSA-2019:4164","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"https://access.redhat.com/errata/RHSA-2019:4164"},{"name":"RHSA-2019:4255","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"https://access.redhat.com/errata/RHSA-2019:4255"}]}]},"cveMetadata":{"assignerOrgId":"baff130e-b8d5-4e15-b3d3-c3cf5d5545c6","assignerShortName":"google_android","cveId":"CVE-2018-9568","datePublished":"2018-12-06T14:00:00.000Z","dateReserved":"2018-04-05T00:00:00.000Z","dateUpdated":"2024-08-05T07:24:56.108Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}