Stack overflow in msm_camera_qup_i2c_read_seq (CVE-2016-6741)

Release Date:

November 30, 2016

Affected Projects:

Android for MSMFirefox OS for MSMQRD Android

Advisory ID:

QCIR-2016-00067-1

CVE ID(s):

CVE-2016-6741

Summary:

The following security vulnerabilities have been identified: CVE-2016-6741 In msm_camera_qup_i2c_read_seq buf is allocated on the stack. buf's size is client->addr_type + num_byte, where num_byte is user controlled. Thread size limit THREAD_SIZE is set to 0x4000. If num_byte > THREAD_SIZE, buf is larger than stack. buf[0] and buf[1] are outside the stack (if array is larger than stack), thus writing there is a stack overflow.

Access Vector: Local
Security Risk: Medium
Access Vector: Local

Affected Versions:

All Android releases from CAF using the Linux kernel.

Patch:

We advise customers to apply the following patches:

Individual Patches

Acknowledgement:

This issue was reported to Google by Gengjia Chen (@chengjia4574) and pjf (weibo.com/jfpan) of IceSword Lab, Qihoo 360. Qualcomm Innovation Center, Inc. (QuIC) thanks Google for bringing this issue to QuIC's attention.

Revisions:

Updated revision. Updated acknowledgment section on Dec. 6, 2016.

Contact:

security-advisory@quicinc.com