Android before 2.3 does not properly restrict access to the system property space, which allows local applications to bypass the application sandbox and gain privileges, as demonstrated by psneuter and KillingInTheNameOf, related to the use of Android shared memory (ashmem) and ASHMEM_SET_PROT_MASK.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T22:14:27.840Z
Reserved: 2011-03-03T00:00:00
Link: CVE-2011-1149

No data.

Status : Modified
Published: 2011-04-21T10:55:01.577
Modified: 2024-11-21T01:25:40.057
Link: CVE-2011-1149

No data.