Skip to main content

Stack overflow in msm_camera_qup_i2c_read_seq (CVE-2016-6741)

Release Date:

November 30, 2016

Affected Projects:

Android for MSMFirefox OS for MSMQRD Android

Advisory ID:


CVE ID(s):



The following security vulnerabilities have been identified: CVE-2016-6741 In msm_camera_qup_i2c_read_seq buf is allocated on the stack. buf's size is client->addr_type + num_byte, where num_byte is user controlled. Thread size limit THREAD_SIZE is set to 0x4000. If num_byte > THREAD_SIZE, buf is larger than stack. buf[0] and buf[1] are outside the stack (if array is larger than stack), thus writing there is a stack overflow.

Access Vector: Local
Security Risk: Medium
Access Vector: Local

Affected Versions:

All Android releases from CAF using the Linux kernel.


We advise customers to apply the following patches:

Individual Patches


This issue was reported to Google by Gengjia Chen (@chengjia4574) and pjf ( of IceSword Lab, Qihoo 360. Qualcomm Innovation Center, Inc. (QuIC) thanks Google for bringing this issue to QuIC's attention.


Updated revision. Updated acknowledgment section on Dec. 6, 2016.