Issue metadata
Sign in to add a comment
|
CrOS: Vulnerability reported in sys-kernel/chromeos-kernel-3_18 |
||||||||||||||||||||||
Issue descriptionAutomated analysis has detected that the following third party packages have had vulnerabilities publicly reported. NOTE: There may be several bugs listed below - in almost all cases, all bugs can be quickly addressed by upgrading to the latest version of the package. Package Name: sys-kernel/chromeos-kernel-3_18 Package Version: [cpe:/o:linux:linux_kernel:3.18] Advisory: CVE-2016-6755 Details: https://vomit.googleplex.com/advisory?id=CVE/CVE-2016-6755 CVSS severity score: 7.6/10.0 Confidence: high Description: An elevation of privilege vulnerability in the Qualcomm camera driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-30740545. References: QC-CR#1065916. Advisory: CVE-2016-6756 Details: https://vomit.googleplex.com/advisory?id=CVE/CVE-2016-6756 CVSS severity score: 2.6/10.0 Confidence: high Description: An information disclosure vulnerability in Qualcomm components including the camera driver and video driver could enable a local malicious application to access data outside of its permission levels. This issue is rated as Moderate because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-29464815. References: QC-CR#1042068. Advisory: CVE-2016-6757 Details: https://vomit.googleplex.com/advisory?id=CVE/CVE-2016-6757 CVSS severity score: 2.6/10.0 Confidence: high Description: An information disclosure vulnerability in Qualcomm components including the camera driver and video driver could enable a local malicious application to access data outside of its permission levels. This issue is rated as Moderate because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-30148242. References: QC-CR#1052821. Advisory: CVE-2016-6791 Details: https://vomit.googleplex.com/advisory?id=CVE/CVE-2016-6791 CVSS severity score: 7.6/10.0 Confidence: high Description: An elevation of privilege vulnerability in the Qualcomm sound driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-31252384. References: QC-CR#1071809. Advisory: CVE-2016-8391 Details: https://vomit.googleplex.com/advisory?id=CVE/CVE-2016-8391 CVSS severity score: 7.6/10.0 Confidence: high Description: An elevation of privilege vulnerability in the Qualcomm sound driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-31253255. References: QC-CR#1072166. Advisory: CVE-2016-8392 Details: https://vomit.googleplex.com/advisory?id=CVE/CVE-2016-8392 CVSS severity score: 7.6/10.0 Confidence: high Description: An elevation of privilege vulnerability in the Qualcomm sound driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-31385862. References: QC-CR#1073136. Advisory: CVE-2016-8399 Details: https://vomit.googleplex.com/advisory?id=CVE/CVE-2016-8399 CVSS severity score: 7.6/10.0 Confidence: high Description: An elevation of privilege vulnerability in the kernel networking subsystem could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Moderate because it first requires compromising a privileged process and current compiler optimizations restrict access to the vulnerable code. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-31349935. Advisory: CVE-2016-8412 Details: https://vomit.googleplex.com/advisory?id=CVE/CVE-2016-8412 CVSS severity score: 7.6/10.0 Confidence: high Description: An elevation of privilege vulnerability in the Qualcomm camera could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-31225246. References: QC-CR#1071891. Advisory: CVE-2016-8415 Details: https://vomit.googleplex.com/advisory?id=CVE/CVE-2016-8415 CVSS severity score: 7.6/10.0 Confidence: high Description: An elevation of privilege vulnerability in the Qualcomm Wi-Fi driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-31750554. References: QC-CR#1079596. Advisory: CVE-2016-8431 Details: https://vomit.googleplex.com/advisory?id=CVE/CVE-2016-8431 CVSS severity score: 9.3/10.0 Confidence: high Description: An elevation of privilege vulnerability in the NVIDIA GPU driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Critical due to the possibility of a local permanent device compromise, which may require reflashing the operating system to repair the device. Product: Android. Versions: Kernel-3.18. Android ID: A-32402179. References: N-CVE-2016-8431. Advisory: CVE-2016-8432 Details: https://vomit.googleplex.com/advisory?id=CVE/CVE-2016-8432 CVSS severity score: 9.3/10.0 Confidence: high Description: An elevation of privilege vulnerability in the NVIDIA GPU driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Critical due to the possibility of a local permanent device compromise, which may require reflashing the operating system to repair the device. Product: Android. Versions: Kernel-3.18. Android ID: A-32447738. References: N-CVE-2016-8432. Advisory: CVE-2016-8435 Details: https://vomit.googleplex.com/advisory?id=CVE/CVE-2016-8435 CVSS severity score: 9.3/10.0 Confidence: high Description: An elevation of privilege vulnerability in the NVIDIA GPU driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Critical due to the possibility of a local permanent device compromise, which may require reflashing the operating system to repair the device. Product: Android. Versions: Kernel-3.18. Android ID: A-32700935. References: N-CVE-2016-8435. Advisory: CVE-2016-8436 Details: https://vomit.googleplex.com/advisory?id=CVE/CVE-2016-8436 CVSS severity score: 9.3/10.0 Confidence: high Description: An elevation of privilege vulnerability in the Qualcomm video driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Critical due to the possibility of a local permanent device compromise, which may require reflashing the operating system to repair the device. Product: Android. Versions: Kernel-3.18. Android ID: A-32450261. References: QC-CR#1007860. Advisory: CVE-2016-8441 Details: https://vomit.googleplex.com/advisory?id=CVE/CVE-2016-8441 CVSS severity score: 7.2/10.0 Confidence: high Description: Possible buffer overflow in the hypervisor. Inappropriate usage of a static array could lead to a buffer overrun. Product: Android. Versions: Kernel 3.18. Android ID: A-31625904. References: QC-CR#1027769. Advisory: CVE-2016-8442 Details: https://vomit.googleplex.com/advisory?id=CVE/CVE-2016-8442 CVSS severity score: 7.2/10.0 Confidence: high Description: Possible unauthorized memory access in the hypervisor. Lack of input validation could allow hypervisor memory to be accessed by the HLOS. Product: Android. Versions: Kernel 3.18. Android ID: A-31625910. QC-CR#1038173. Advisory: CVE-2016-8443 Details: https://vomit.googleplex.com/advisory?id=CVE/CVE-2016-8443 CVSS severity score: 7.2/10.0 Confidence: high Description: Possible unauthorized memory access in the hypervisor. Incorrect configuration provides access to subsystem page tables. Product: Android. Versions: Kernel 3.18. Android ID: A-32576499. References: QC-CR#964185. Advisory: CVE-2016-8452 Details: https://vomit.googleplex.com/advisory?id=CVE/CVE-2016-8452 CVSS severity score: 7.6/10.0 Confidence: high Description: An elevation of privilege vulnerability in the Qualcomm Wi-Fi driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-32506396. References: QC-CR#1050323. Advisory: CVE-2016-8454 Details: https://vomit.googleplex.com/advisory?id=CVE/CVE-2016-8454 CVSS severity score: 7.6/10.0 Confidence: high Description: An elevation of privilege vulnerability in the Broadcom Wi-Fi driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-32174590. References: B-RB#107142. Advisory: CVE-2016-8456 Details: https://vomit.googleplex.com/advisory?id=CVE/CVE-2016-8456 CVSS severity score: 7.6/10.0 Confidence: high Description: An elevation of privilege vulnerability in the Broadcom Wi-Fi driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-32219255. References: B-RB#105580. Advisory: CVE-2016-8457 Details: https://vomit.googleplex.com/advisory?id=CVE/CVE-2016-8457 CVSS severity score: 7.6/10.0 Confidence: high Description: An elevation of privilege vulnerability in the Broadcom Wi-Fi driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-32219453. References: B-RB#106116. Advisory: CVE-2016-8458 Details: https://vomit.googleplex.com/advisory?id=CVE/CVE-2016-8458 CVSS severity score: 7.6/10.0 Confidence: high Description: An elevation of privilege vulnerability in the Synaptics touchscreen driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-31968442. Advisory: CVE-2016-8464 Details: https://vomit.googleplex.com/advisory?id=CVE/CVE-2016-8464 CVSS severity score: 7.6/10.0 Confidence: high Description: An elevation of privilege vulnerability in the Broadcom Wi-Fi driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Moderate because it first requires compromising a privileged process and is mitigated by current platform configurations. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-29000183. References: B-RB#106314. Advisory: CVE-2016-8465 Details: https://vomit.googleplex.com/advisory?id=CVE/CVE-2016-8465 CVSS severity score: 7.6/10.0 Confidence: high Description: An elevation of privilege vulnerability in the Broadcom Wi-Fi driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Moderate because it first requires compromising a privileged process and is mitigated by current platform configurations. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-32474971. References: B-RB#106053. Advisory: CVE-2016-8466 Details: https://vomit.googleplex.com/advisory?id=CVE/CVE-2016-8466 CVSS severity score: 7.6/10.0 Confidence: high Description: An elevation of privilege vulnerability in the Broadcom Wi-Fi driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Moderate because it first requires compromising a privileged process and is mitigated by current platform configurations. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-31822524. References: B-RB#105268. Advisory: CVE-2016-8468 Details: https://vomit.googleplex.com/advisory?id=CVE/CVE-2016-8468 CVSS severity score: 7.6/10.0 Confidence: high Description: An elevation of privilege vulnerability in Binder could enable a local malicious application to execute arbitrary code within the context of a privileged process. This issue is rated as Moderate because it first requires compromising a privileged process and is mitigated by current platform configurations. Product: Android. Versions: Kernel-3.18. Android ID: A-32394425. Advisory: CVE-2016-8475 Details: https://vomit.googleplex.com/advisory?id=CVE/CVE-2016-8475 CVSS severity score: 2.6/10.0 Confidence: high Description: An information disclosure vulnerability in the HTC input driver could enable a local malicious application to access data outside of its permission levels. This issue is rated as Moderate because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.18. Android ID: A-32591129. Advisory: CVE-2017-0403 Details: https://vomit.googleplex.com/advisory?id=CVE/CVE-2017-0403 CVSS severity score: 7.6/10.0 Confidence: high Description: An elevation of privilege vulnerability in the kernel performance subsystem could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-32402548. Advisory: CVE-2017-0404 Details: https://vomit.googleplex.com/advisory?id=CVE/CVE-2017-0404 CVSS severity score: 7.6/10.0 Confidence: high Description: An elevation of privilege vulnerability in the kernel sound subsystem could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-32510733.
,
Jan 17 2017
,
Jan 17 2017
,
Jan 17 2017
,
Jan 17 2017
Here is a quick analysis: Advisory: CVE-2016-6755 -> chromeos not affected Advisory: CVE-2016-6756 -> chromeos not affected Advisory: CVE-2016-6757 -> chromeos not affected Advisory: CVE-2016-6791 -> chromeos not affected Advisory: CVE-2016-8391 -> chromeos not affected Advisory: CVE-2016-8392 -> chromeos not affected Advisory: CVE-2016-8399 -> Upstream commit 0eab121ef875. Needs patch into all kernels. "An elevation of privilege vulnerability in the kernel networking subsystem could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Moderate because it first requires compromising a privileged process and current compiler optimizations restrict access to the vulnerable code. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-31349935." Advisory: CVE-2016-8412 -> chromeos not affected Advisory: CVE-2016-8415 -> chromeos not affected Advisory: CVE-2016-8431 Advisory: CVE-2016-8432 Advisory: CVE-2016-8435 -> NVIDIA GPU driver problems. Fixes not available in source. chromeos likely not affected. Advisory: CVE-2016-8436 -> chromeos not affected Advisory: CVE-2016-8441 Advisory: CVE-2016-8442 Advisory: CVE-2016-8443 -> Qualcomm component problems. Fixes not available in source. chromeos likely not affected. Advisory: CVE-2016-8452 -> chromeos not affected Advisory: CVE-2016-8454 Advisory: CVE-2016-8456 Advisory: CVE-2016-8457 Advisory: CVE-2016-8464 Advisory: CVE-2016-8465 Advisory: CVE-2016-8466 -> Broadcom Wi-Fi driver problems. Fixes not available in source. chromeos likely not affected. Advisory: CVE-2016-8458 -> Synaptics touchscreen driver problem. Fix not available in source. May be Android specific. Impact unknown. Advisory: CVE-2016-8468 -> Binder problem. Fix not available in source. Not a kernel problem ? chromeos likely not affected. Advisory: CVE-2016-8475 -> HTC input driver problem. Fix not available in source. Impact unknown, though the problem appears to be Android specific. Advisory: CVE-2017-0403 -> Kernel performance subsystem problem. Fix not available in source. Impact unknown. Advisory: CVE-2017-0404 -> kernel sound subsystem problem. Fix not available in source. Impact unknown. I'll file a separate bug to address CVE-2016-8399.
,
Jan 22 2017
CVE-2016-8399: Fixed in all Chromeos releases.
CVE-2017-0403: Published Android bug id 32402548.
Commit 6c18dfc75722 in msm (Qualcomm) kernel.
The fix is in the Android code, but not upstream nor in chromeos.
Needs further analysis if it is applicable to upstream/chromeos
or if it only applies to msm.
CVE-2017-0404: Published Android bug id 32510733.
Still looking for matching Android commit.
CVE-2016-8458: Published android bug id 31968442.
Still looking for matching Android commit.
,
Feb 6 2017
groeck: Uh oh! This issue still open and hasn't been updated in the last 14 days. This is a serious vulnerability, and we want to ensure that there's progress. Could you please leave an update with the current status and any potential blockers? If you're not the right owner for this issue, could you please remove yourself as soon as possible or help us find the right one? If the issue is fixed or you can't reproduce it, please close the bug. If you've started working on a fix, please set the status to Started. Thanks for your time! To disable nags, add the Disable-Nags label. For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot
,
Feb 9 2017
,
Feb 10 2017
,
Feb 12 2017
,
Feb 13 2017
Your change meets the bar and is auto-approved for M57. Please go ahead and merge the CL to branch 2987 manually. Please contact milestone owner if you have questions. Owners: amineer@(clank), cmasso@(bling), ketakid@(cros), govind@(desktop) For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot
,
Feb 13 2017
parent bug, not used for individual merges.
,
Feb 14 2017
(to keep sheriffbot quiet :-)
,
May 19 2017
This bug has been closed for more than 14 weeks. Removing security view restrictions. For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot
,
May 30 2017
,
Aug 1 2017
,
Jan 22 2018
|
|||||||||||||||||||||||
►
Sign in to add a comment |
|||||||||||||||||||||||
Comment 1 by kerrnel@chromium.org
, Jan 17 2017