Stack overflow in msm_camera_qup_i2c_read_seq (CVE-2016-6741)
Release Date:
November 30, 2016
Affected Projects:
Android for MSMFirefox OS for MSMQRD Android
Advisory ID:
QCIR-2016-00067-1
CVE ID(s):
Summary:
The following security vulnerabilities have been identified: CVE-2016-6741 In msm_camera_qup_i2c_read_seq buf is allocated on the stack. buf's size is client->addr_type + num_byte, where num_byte is user controlled. Thread size limit THREAD_SIZE is set to 0x4000. If num_byte > THREAD_SIZE, buf is larger than stack. buf[0] and buf[1] are outside the stack (if array is larger than stack), thus writing there is a stack overflow.
Access Vector: Local
Security Risk: Medium
Access Vector: Local
Affected Versions:
All Android releases from CAF using the Linux kernel.
Patch:
We advise customers to apply the following patches:
Individual Patches
- CVE-2016-6741: https://www.codeaurora.org/gitweb/quic/la/?p=kernel/msm-3.10.git;a=commit;h=80a1d9978c11f76bbe6d2e622bf2ded18f27e34f
Acknowledgement:
This issue was reported to Google by Gengjia Chen (@chengjia4574) and pjf (weibo.com/jfpan) of IceSword Lab, Qihoo 360. Qualcomm Innovation Center, Inc. (QuIC) thanks Google for bringing this issue to QuIC's attention.
Revisions:
Updated revision. Updated acknowledgment section on Dec. 6, 2016.