CVE-2015-6642
Publication date 6 January 2016
Last updated 25 August 2025
Ubuntu priority
Cvss 3 Severity Score
Description
The kernel in Android before 5.1.1 LMY49F and 6.0 before 2016-01-01 allows attackers to obtain sensitive information, and consequently bypass an unspecified protection mechanism, via unknown vectors, as demonstrated by obtaining Signature or SignatureOrSystem access, aka internal bug 24157888.
Status
| Package | Ubuntu Release | Status |
|---|---|---|
| linux | ||
| 14.04 LTS trusty |
Not affected
|
|
| linux-armadaxp | ||
| 14.04 LTS trusty | Not in release | |
| linux-flo | ||
| 14.04 LTS trusty | Not in release | |
| linux-fsl-imx51 | ||
| 14.04 LTS trusty | Not in release | |
| linux-goldfish | ||
| 14.04 LTS trusty | Not in release | |
| linux-grouper | ||
| 14.04 LTS trusty | Not in release | |
| linux-linaro-omap | ||
| 14.04 LTS trusty | Not in release | |
| linux-linaro-shared | ||
| 14.04 LTS trusty | Not in release | |
| linux-linaro-vexpress | ||
| 14.04 LTS trusty | Not in release | |
| linux-lts-quantal | ||
| 14.04 LTS trusty | Not in release | |
| linux-lts-raring | ||
| 14.04 LTS trusty | Not in release | |
| linux-lts-saucy | ||
| 14.04 LTS trusty | Not in release | |
| linux-lts-trusty | ||
| 14.04 LTS trusty | Not in release | |
| linux-lts-utopic | ||
| 14.04 LTS trusty | Not in release | |
| linux-lts-vivid | ||
| 14.04 LTS trusty | Not in release | |
| linux-lts-wily | ||
| 14.04 LTS trusty | Not in release | |
| linux-lts-xenial | ||
| 14.04 LTS trusty |
Not affected
|
|
| linux-maguro | ||
| 14.04 LTS trusty | Not in release | |
| linux-mako | ||
| 14.04 LTS trusty | Not in release | |
| linux-manta | ||
| 14.04 LTS trusty | Not in release | |
| linux-qcm-msm | ||
| 14.04 LTS trusty | Not in release | |
| linux-raspi2 | ||
| 14.04 LTS trusty | Not in release | |
| linux-ti-omap4 | ||
| 14.04 LTS trusty | Not in release | |
Notes
mdeslaur
android-specific
jdstrand
android kernels (flo, goldfish, grouper, maguro, mako and manta) are not supported on the Ubuntu Touch 14.10 and earlier preview kernels linux-lts-saucy no longer receives official support linux-lts-quantal no longer receives official support
sbeattie
affects arch/arm/mach-msm only, so android kernels only
Severity score breakdown
| Parameter | Value |
|---|---|
| Base score |
|
| Attack vector | Network |
| Attack complexity | Low |
| Privileges required | None |
| User interaction | None |
| Scope | Unchanged |
| Confidentiality | High |
| Integrity impact | High |
| Availability impact | High |
| Vector | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |