Vulnerability Description
The makefile in the Qualcomm components in Android before 2016-07-05 on Nexus 5 and 7 (2013) devices omits the -fno-strict-overflow option to gcc, which might allow attackers to gain privileges via a crafted application that leverages incorrect compiler optimization of an integer-overflow protection mechanism, aka Android internal bug 28821731 and Qualcomm internal bug CR691916.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Android | <= 6.0.1 |
Related Weaknesses (CWE)
References
- http://source.android.com/security/bulletin/2016-07-01.htmlVendor Advisory
- http://www.securityfocus.com/bid/91628
- https://source.codeaurora.org/quic/la/kernel/lk/commit/?id=c2119f1fba46f3b6e153a
- http://source.android.com/security/bulletin/2016-07-01.htmlVendor Advisory
- http://www.securityfocus.com/bid/91628
- https://source.codeaurora.org/quic/la/kernel/lk/commit/?id=c2119f1fba46f3b6e153a
FAQ
What is CVE-2014-9799?
CVE-2014-9799 is a vulnerability with a CVSS score of 7.8 (HIGH). The makefile in the Qualcomm components in Android before 2016-07-05 on Nexus 5 and 7 (2013) devices omits the -fno-strict-overflow option to gcc, which might allow attackers to gain privileges via a ...
How severe is CVE-2014-9799?
CVE-2014-9799 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2014-9799?
Check the references section above for vendor advisories and patch information. Affected products include: Google Android.