CVE-2017-13167
Description
An elevation of privilege vulnerability in the kernel sound timer. Product: Android. Versions: Android kernel. Android ID A-37240993.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
An elevation of privilege vulnerability in the kernel sound timer of Android kernel allows local privilege escalation.
Vulnerability
The vulnerability resides in the kernel sound timer of the Android kernel. It is an elevation of privilege (EoP) flaw, as identified by Android ID A-37240993. The affected versions are the Android kernel, across supported Google Pixel and Nexus devices prior to the 2017-12-05 security patch level [1].
Exploitation
An attacker requires local access to the device. The exact exploitation steps are not detailed in the available references, but as an elevation of privilege vulnerability in the kernel, it is likely exploited by executing a crafted application that triggers the flaw in the sound timer component to gain elevated privileges [1].
Impact
Successful exploitation allows an attacker to elevate their privileges within the kernel context, potentially gaining higher-level permissions than originally granted. This could lead to full compromise of the device's confidentiality, integrity, and availability, although the specific scope is not further defined in the references [1].
Mitigation
Google released a fix as part of the 2017-12-05 security patch level. All supported Google Pixel and Nexus devices should accept the OTA update or flash the firmware images available on the Google Developer site. Devices with a security patch level of 2017-12-05 or later are not affected [1]. No workarounds are provided, and the device must be patched.
AI Insight generated on May 22, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
60- osv-coords58 versionspkg:rpm/suse/kernel-bigmem&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4pkg:rpm/suse/kernel-bigmem&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4pkg:rpm/suse/kernel-bigsmp&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP3-LTSSpkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Point%20of%20Sale%2011%20SP3pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP3-LTSSpkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1-LTSSpkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2012-LTSSpkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/kernel-default&distro=SUSE%20OpenStack%20Cloud%206pkg:rpm/suse/kernel-docs&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2011%20SP4pkg:rpm/suse/kernel-ec2&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Public%20Cloud%2012pkg:rpm/suse/kernel-ec2&distro=SUSE%20Linux%20Enterprise%20Point%20of%20Sale%2011%20SP3pkg:rpm/suse/kernel-ec2&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP3-LTSSpkg:rpm/suse/kernel-ec2&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4pkg:rpm/suse/kernel-ec2&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4pkg:rpm/suse/kernel-pae&distro=SUSE%20Linux%20Enterprise%20Point%20of%20Sale%2011%20SP3pkg:rpm/suse/kernel-pae&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP3-LTSSpkg:rpm/suse/kernel-pae&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4pkg:rpm/suse/kernel-pae&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4pkg:rpm/suse/kernel-ppc64&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4pkg:rpm/suse/kernel-ppc64&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4pkg:rpm/suse/kernel-rt&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2011%20SP4pkg:rpm/suse/kernel-rt_trace&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2011%20SP4pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Point%20of%20Sale%2011%20SP3pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP3-LTSSpkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1-LTSSpkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2012-LTSSpkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/kernel-source&distro=SUSE%20OpenStack%20Cloud%206pkg:rpm/suse/kernel-source-rt&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2011%20SP4pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Point%20of%20Sale%2011%20SP3pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP3-LTSSpkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1-LTSSpkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2012-LTSSpkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/kernel-syms&distro=SUSE%20OpenStack%20Cloud%206pkg:rpm/suse/kernel-syms-rt&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2011%20SP4pkg:rpm/suse/kernel-trace&distro=SUSE%20Linux%20Enterprise%20Point%20of%20Sale%2011%20SP3pkg:rpm/suse/kernel-trace&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP3-LTSSpkg:rpm/suse/kernel-trace&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4pkg:rpm/suse/kernel-trace&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4pkg:rpm/suse/kernel-xen&distro=SUSE%20Linux%20Enterprise%20Point%20of%20Sale%2011%20SP3pkg:rpm/suse/kernel-xen&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP3-LTSSpkg:rpm/suse/kernel-xen&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4pkg:rpm/suse/kernel-xen&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1-LTSSpkg:rpm/suse/kernel-xen&distro=SUSE%20Linux%20Enterprise%20Server%2012-LTSSpkg:rpm/suse/kernel-xen&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4pkg:rpm/suse/kernel-xen&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/kernel-xen&distro=SUSE%20OpenStack%20Cloud%206pkg:rpm/suse/kgraft-patch-SLE12-SP1_Update_24&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1-LTSSpkg:rpm/suse/kgraft-patch-SLE12-SP1_Update_24&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/kgraft-patch-SLE12-SP1_Update_24&distro=SUSE%20OpenStack%20Cloud%206
< 3.0.101-108.21.1+ 57 more
- (no CPE)range: < 3.0.101-108.21.1
- (no CPE)range: < 3.0.101-108.21.1
- (no CPE)range: < 3.0.101-0.47.106.11.1
- (no CPE)range: < 3.0.101-0.47.106.11.1
- (no CPE)range: < 3.0.101-0.47.106.11.1
- (no CPE)range: < 3.0.101-108.21.1
- (no CPE)range: < 3.12.74-60.64.69.1
- (no CPE)range: < 3.12.61-52.111.1
- (no CPE)range: < 3.0.101-108.21.1
- (no CPE)range: < 3.12.74-60.64.69.1
- (no CPE)range: < 3.12.74-60.64.69.1
- (no CPE)range: < 3.0.101-108.21.2
- (no CPE)range: < 3.12.74-60.64.69.1
- (no CPE)range: < 3.0.101-0.47.106.11.1
- (no CPE)range: < 3.0.101-0.47.106.11.1
- (no CPE)range: < 3.0.101-108.21.1
- (no CPE)range: < 3.0.101-108.21.1
- (no CPE)range: < 3.0.101-0.47.106.11.1
- (no CPE)range: < 3.0.101-0.47.106.11.1
- (no CPE)range: < 3.0.101-108.21.1
- (no CPE)range: < 3.0.101-108.21.1
- (no CPE)range: < 3.0.101-108.21.1
- (no CPE)range: < 3.0.101-108.21.1
- (no CPE)range: < 3.0.101.rt130-69.14.1
- (no CPE)range: < 3.0.101.rt130-69.14.1
- (no CPE)range: < 3.0.101-0.47.106.11.1
- (no CPE)range: < 3.0.101-0.47.106.11.1
- (no CPE)range: < 3.0.101-108.21.1
- (no CPE)range: < 3.12.74-60.64.69.1
- (no CPE)range: < 3.12.61-52.111.1
- (no CPE)range: < 3.0.101-108.21.1
- (no CPE)range: < 3.12.74-60.64.69.1
- (no CPE)range: < 3.12.74-60.64.69.1
- (no CPE)range: < 3.0.101.rt130-69.14.1
- (no CPE)range: < 3.0.101-0.47.106.11.1
- (no CPE)range: < 3.0.101-0.47.106.11.1
- (no CPE)range: < 3.0.101-108.21.1
- (no CPE)range: < 3.12.74-60.64.69.1
- (no CPE)range: < 3.12.61-52.111.1
- (no CPE)range: < 3.0.101-108.21.1
- (no CPE)range: < 3.12.74-60.64.69.1
- (no CPE)range: < 3.12.74-60.64.69.1
- (no CPE)range: < 3.0.101.rt130-69.14.1
- (no CPE)range: < 3.0.101-0.47.106.11.1
- (no CPE)range: < 3.0.101-0.47.106.11.1
- (no CPE)range: < 3.0.101-108.21.1
- (no CPE)range: < 3.0.101-108.21.1
- (no CPE)range: < 3.0.101-0.47.106.11.1
- (no CPE)range: < 3.0.101-0.47.106.11.1
- (no CPE)range: < 3.0.101-108.21.1
- (no CPE)range: < 3.12.74-60.64.69.1
- (no CPE)range: < 3.12.61-52.111.1
- (no CPE)range: < 3.0.101-108.21.1
- (no CPE)range: < 3.12.74-60.64.69.1
- (no CPE)range: < 3.12.74-60.64.69.1
- (no CPE)range: < 1-2.3.1
- (no CPE)range: < 1-2.3.1
- (no CPE)range: < 1-2.3.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2News mentions
0No linked articles in our index yet.