High severity7.8NVD Advisory· Published Aug 7, 2016· Updated May 6, 2026
CVE-2016-5340
CVE-2016-5340
Description
The is_ashmem_file function in drivers/staging/android/ashmem.c in a certain Qualcomm Innovation Center (QuIC) Android patch for the Linux kernel 3.x mishandles pointer validation within the KGSL Linux Graphics Module, which allows attackers to bypass intended access restrictions by using the /ashmem string as the dentry name.
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- source.codeaurora.org/quic/la/kernel/msm-3.10/commit/nvdMailing ListPatchThird Party Advisory
- source.android.com/security/bulletin/2016-10-01.htmlnvdThird Party Advisory
- www.securityfocus.com/bid/92374nvdThird Party AdvisoryVDB Entry
- www.securitytracker.com/id/1036763nvdThird Party AdvisoryVDB Entry
- www.codeaurora.org/invalid-path-check-ashmem-memory-file-cve-2016-5340nvdBroken Link
News mentions
0No linked articles in our index yet.