New issue
Advanced search Search tips
Note: Color blocks (like or ) mean that a user may not be available. Tooltip shows the reason.

Issue 681306 link

Starred by 1 user

Issue metadata

Status: Archived
Owner:
Closed: Feb 2017
Cc:
Components:
EstimatedDays: ----
NextAction: ----
OS: Chrome
Pri: 1
Type: Bug-Security



Sign in to add a comment

CrOS: Vulnerability reported in sys-kernel/chromeos-kernel-3_18

Project Member Reported by vomit.go...@appspot.gserviceaccount.com, Jan 14 2017

Issue description

Automated analysis has detected that the following third party packages have had vulnerabilities publicly reported. 

NOTE: There may be several bugs listed below - in almost all cases, all bugs can be quickly addressed by upgrading to the latest version of the package.

Package Name: sys-kernel/chromeos-kernel-3_18
Package Version: [cpe:/o:linux:linux_kernel:3.18]

Advisory: CVE-2016-6755
  Details: https://vomit.googleplex.com/advisory?id=CVE/CVE-2016-6755
  CVSS severity score: 7.6/10.0
  Confidence: high
  Description:

An elevation of privilege vulnerability in the Qualcomm camera driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-30740545. References: QC-CR#1065916.
Advisory: CVE-2016-6756
  Details: https://vomit.googleplex.com/advisory?id=CVE/CVE-2016-6756
  CVSS severity score: 2.6/10.0
  Confidence: high
  Description:

An information disclosure vulnerability in Qualcomm components including the camera driver and video driver could enable a local malicious application to access data outside of its permission levels. This issue is rated as Moderate because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-29464815. References: QC-CR#1042068.
Advisory: CVE-2016-6757
  Details: https://vomit.googleplex.com/advisory?id=CVE/CVE-2016-6757
  CVSS severity score: 2.6/10.0
  Confidence: high
  Description:

An information disclosure vulnerability in Qualcomm components including the camera driver and video driver could enable a local malicious application to access data outside of its permission levels. This issue is rated as Moderate because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-30148242. References: QC-CR#1052821.
Advisory: CVE-2016-6791
  Details: https://vomit.googleplex.com/advisory?id=CVE/CVE-2016-6791
  CVSS severity score: 7.6/10.0
  Confidence: high
  Description:

An elevation of privilege vulnerability in the Qualcomm sound driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-31252384. References: QC-CR#1071809.
Advisory: CVE-2016-8391
  Details: https://vomit.googleplex.com/advisory?id=CVE/CVE-2016-8391
  CVSS severity score: 7.6/10.0
  Confidence: high
  Description:

An elevation of privilege vulnerability in the Qualcomm sound driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-31253255. References: QC-CR#1072166.
Advisory: CVE-2016-8392
  Details: https://vomit.googleplex.com/advisory?id=CVE/CVE-2016-8392
  CVSS severity score: 7.6/10.0
  Confidence: high
  Description:

An elevation of privilege vulnerability in the Qualcomm sound driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-31385862. References: QC-CR#1073136.
Advisory: CVE-2016-8399
  Details: https://vomit.googleplex.com/advisory?id=CVE/CVE-2016-8399
  CVSS severity score: 7.6/10.0
  Confidence: high
  Description:

An elevation of privilege vulnerability in the kernel networking subsystem could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Moderate because it first requires compromising a privileged process and current compiler optimizations restrict access to the vulnerable code. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-31349935.
Advisory: CVE-2016-8412
  Details: https://vomit.googleplex.com/advisory?id=CVE/CVE-2016-8412
  CVSS severity score: 7.6/10.0
  Confidence: high
  Description:

An elevation of privilege vulnerability in the Qualcomm camera could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-31225246. References: QC-CR#1071891.
Advisory: CVE-2016-8415
  Details: https://vomit.googleplex.com/advisory?id=CVE/CVE-2016-8415
  CVSS severity score: 7.6/10.0
  Confidence: high
  Description:

An elevation of privilege vulnerability in the Qualcomm Wi-Fi driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-31750554. References: QC-CR#1079596.
Advisory: CVE-2016-8431
  Details: https://vomit.googleplex.com/advisory?id=CVE/CVE-2016-8431
  CVSS severity score: 9.3/10.0
  Confidence: high
  Description:

An elevation of privilege vulnerability in the NVIDIA GPU driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Critical due to the possibility of a local permanent device compromise, which may require reflashing the operating system to repair the device. Product: Android. Versions: Kernel-3.18. Android ID: A-32402179. References: N-CVE-2016-8431.
Advisory: CVE-2016-8432
  Details: https://vomit.googleplex.com/advisory?id=CVE/CVE-2016-8432
  CVSS severity score: 9.3/10.0
  Confidence: high
  Description:

An elevation of privilege vulnerability in the NVIDIA GPU driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Critical due to the possibility of a local permanent device compromise, which may require reflashing the operating system to repair the device. Product: Android. Versions: Kernel-3.18. Android ID: A-32447738. References: N-CVE-2016-8432.
Advisory: CVE-2016-8435
  Details: https://vomit.googleplex.com/advisory?id=CVE/CVE-2016-8435
  CVSS severity score: 9.3/10.0
  Confidence: high
  Description:

An elevation of privilege vulnerability in the NVIDIA GPU driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Critical due to the possibility of a local permanent device compromise, which may require reflashing the operating system to repair the device. Product: Android. Versions: Kernel-3.18. Android ID: A-32700935. References: N-CVE-2016-8435.
Advisory: CVE-2016-8436
  Details: https://vomit.googleplex.com/advisory?id=CVE/CVE-2016-8436
  CVSS severity score: 9.3/10.0
  Confidence: high
  Description:

An elevation of privilege vulnerability in the Qualcomm video driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Critical due to the possibility of a local permanent device compromise, which may require reflashing the operating system to repair the device. Product: Android. Versions: Kernel-3.18. Android ID: A-32450261. References: QC-CR#1007860.
Advisory: CVE-2016-8441
  Details: https://vomit.googleplex.com/advisory?id=CVE/CVE-2016-8441
  CVSS severity score: 7.2/10.0
  Confidence: high
  Description:

Possible buffer overflow in the hypervisor. Inappropriate usage of a static array could lead to a buffer overrun. Product: Android. Versions: Kernel 3.18. Android ID: A-31625904. References: QC-CR#1027769.
Advisory: CVE-2016-8442
  Details: https://vomit.googleplex.com/advisory?id=CVE/CVE-2016-8442
  CVSS severity score: 7.2/10.0
  Confidence: high
  Description:

Possible unauthorized memory access in the hypervisor. Lack of input validation could allow hypervisor memory to be accessed by the HLOS. Product: Android. Versions: Kernel 3.18. Android ID: A-31625910. QC-CR#1038173.
Advisory: CVE-2016-8443
  Details: https://vomit.googleplex.com/advisory?id=CVE/CVE-2016-8443
  CVSS severity score: 7.2/10.0
  Confidence: high
  Description:

Possible unauthorized memory access in the hypervisor. Incorrect configuration provides access to subsystem page tables. Product: Android. Versions: Kernel 3.18. Android ID: A-32576499. References: QC-CR#964185.
Advisory: CVE-2016-8452
  Details: https://vomit.googleplex.com/advisory?id=CVE/CVE-2016-8452
  CVSS severity score: 7.6/10.0
  Confidence: high
  Description:

An elevation of privilege vulnerability in the Qualcomm Wi-Fi driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-32506396. References: QC-CR#1050323.
Advisory: CVE-2016-8454
  Details: https://vomit.googleplex.com/advisory?id=CVE/CVE-2016-8454
  CVSS severity score: 7.6/10.0
  Confidence: high
  Description:

An elevation of privilege vulnerability in the Broadcom Wi-Fi driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-32174590. References: B-RB#107142.
Advisory: CVE-2016-8456
  Details: https://vomit.googleplex.com/advisory?id=CVE/CVE-2016-8456
  CVSS severity score: 7.6/10.0
  Confidence: high
  Description:

An elevation of privilege vulnerability in the Broadcom Wi-Fi driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-32219255. References: B-RB#105580.
Advisory: CVE-2016-8457
  Details: https://vomit.googleplex.com/advisory?id=CVE/CVE-2016-8457
  CVSS severity score: 7.6/10.0
  Confidence: high
  Description:

An elevation of privilege vulnerability in the Broadcom Wi-Fi driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-32219453. References: B-RB#106116.
Advisory: CVE-2016-8458
  Details: https://vomit.googleplex.com/advisory?id=CVE/CVE-2016-8458
  CVSS severity score: 7.6/10.0
  Confidence: high
  Description:

An elevation of privilege vulnerability in the Synaptics touchscreen driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-31968442.
Advisory: CVE-2016-8464
  Details: https://vomit.googleplex.com/advisory?id=CVE/CVE-2016-8464
  CVSS severity score: 7.6/10.0
  Confidence: high
  Description:

An elevation of privilege vulnerability in the Broadcom Wi-Fi driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Moderate because it first requires compromising a privileged process and is mitigated by current platform configurations. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-29000183. References: B-RB#106314.
Advisory: CVE-2016-8465
  Details: https://vomit.googleplex.com/advisory?id=CVE/CVE-2016-8465
  CVSS severity score: 7.6/10.0
  Confidence: high
  Description:

An elevation of privilege vulnerability in the Broadcom Wi-Fi driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Moderate because it first requires compromising a privileged process and is mitigated by current platform configurations. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-32474971. References: B-RB#106053.
Advisory: CVE-2016-8466
  Details: https://vomit.googleplex.com/advisory?id=CVE/CVE-2016-8466
  CVSS severity score: 7.6/10.0
  Confidence: high
  Description:

An elevation of privilege vulnerability in the Broadcom Wi-Fi driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Moderate because it first requires compromising a privileged process and is mitigated by current platform configurations. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-31822524. References: B-RB#105268.
Advisory: CVE-2016-8468
  Details: https://vomit.googleplex.com/advisory?id=CVE/CVE-2016-8468
  CVSS severity score: 7.6/10.0
  Confidence: high
  Description:

An elevation of privilege vulnerability in Binder could enable a local malicious application to execute arbitrary code within the context of a privileged process. This issue is rated as Moderate because it first requires compromising a privileged process and is mitigated by current platform configurations. Product: Android. Versions: Kernel-3.18. Android ID: A-32394425.
Advisory: CVE-2016-8475
  Details: https://vomit.googleplex.com/advisory?id=CVE/CVE-2016-8475
  CVSS severity score: 2.6/10.0
  Confidence: high
  Description:

An information disclosure vulnerability in the HTC input driver could enable a local malicious application to access data outside of its permission levels. This issue is rated as Moderate because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.18. Android ID: A-32591129.
Advisory: CVE-2017-0403
  Details: https://vomit.googleplex.com/advisory?id=CVE/CVE-2017-0403
  CVSS severity score: 7.6/10.0
  Confidence: high
  Description:

An elevation of privilege vulnerability in the kernel performance subsystem could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-32402548.
Advisory: CVE-2017-0404
  Details: https://vomit.googleplex.com/advisory?id=CVE/CVE-2017-0404
  CVSS severity score: 7.6/10.0
  Confidence: high
  Description:

An elevation of privilege vulnerability in the kernel sound subsystem could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process. Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-32510733.


 
Components: OS>Kernel
Labels: Security_Impact-Stable M-56 Security_Severity-High
Cc: chromeos-kernel-security-bug-access@google.com
Cc: dtor@chromium.org snanda@chromium.org
Owner: groeck@chromium.org
Status: Assigned (was: Untriaged)

Comment 5 by groeck@chromium.org, Jan 17 2017

Here is a quick analysis:

Advisory: CVE-2016-6755
-> chromeos not affected

Advisory: CVE-2016-6756
-> chromeos not affected

Advisory: CVE-2016-6757
-> chromeos not affected

Advisory: CVE-2016-6791
-> chromeos not affected

Advisory: CVE-2016-8391
-> chromeos not affected

Advisory: CVE-2016-8392
-> chromeos not affected

Advisory: CVE-2016-8399
-> Upstream commit 0eab121ef875.
   Needs patch into all kernels.

"An elevation of privilege vulnerability in the kernel networking subsystem
 could enable a local malicious application to execute arbitrary code within
 the context of the kernel. This issue is rated as Moderate because it first
 requires compromising a privileged process and current compiler optimizations
 restrict access to the vulnerable code.
 Product: Android. Versions: Kernel-3.10, Kernel-3.18. Android ID: A-31349935."

Advisory: CVE-2016-8412
-> chromeos not affected

Advisory: CVE-2016-8415
-> chromeos not affected

Advisory: CVE-2016-8431
Advisory: CVE-2016-8432
Advisory: CVE-2016-8435
-> NVIDIA GPU driver problems. Fixes not available in source.
   chromeos likely not affected.

Advisory: CVE-2016-8436
-> chromeos not affected

Advisory: CVE-2016-8441
Advisory: CVE-2016-8442
Advisory: CVE-2016-8443
-> Qualcomm component problems. Fixes not available in source.
   chromeos likely not affected.

Advisory: CVE-2016-8452
-> chromeos not affected

Advisory: CVE-2016-8454
Advisory: CVE-2016-8456
Advisory: CVE-2016-8457
Advisory: CVE-2016-8464
Advisory: CVE-2016-8465
Advisory: CVE-2016-8466
-> Broadcom Wi-Fi driver problems. Fixes not available in source.
   chromeos likely not affected.

Advisory: CVE-2016-8458
-> Synaptics touchscreen driver problem. Fix not available in source.
   May be Android specific. Impact unknown.

Advisory: CVE-2016-8468
-> Binder problem. Fix not available in source.
   Not a kernel problem ?
   chromeos likely not affected.

Advisory: CVE-2016-8475
-> HTC input driver problem. Fix not available in source.
   Impact unknown, though the problem appears to be Android specific.

Advisory: CVE-2017-0403
-> Kernel performance subsystem problem. Fix not available in source.
   Impact unknown.

Advisory: CVE-2017-0404
-> kernel sound subsystem problem. Fix not available in source.
   Impact unknown.

I'll file a separate bug to address CVE-2016-8399.

Comment 6 by groeck@chromium.org, Jan 22 2017

CVE-2016-8399: Fixed in all Chromeos releases.
CVE-2017-0403: Published Android bug id 32402548.
               Commit 6c18dfc75722 in msm (Qualcomm) kernel.
               The fix is in the Android code, but not upstream nor in chromeos.
               Needs further analysis if it is applicable to upstream/chromeos
               or if it only applies to msm.
CVE-2017-0404: Published Android bug id 32510733.
               Still looking for matching Android commit.
CVE-2016-8458: Published android bug id 31968442.
               Still looking for matching Android commit.

Project Member

Comment 7 by sheriffbot@chromium.org, Feb 6 2017

groeck: Uh oh! This issue still open and hasn't been updated in the last 14 days. This is a serious vulnerability, and we want to ensure that there's progress. Could you please leave an update with the current status and any potential blockers?

If you're not the right owner for this issue, could you please remove yourself as soon as possible or help us find the right one?

If the issue is fixed or you can't reproduce it, please close the bug. If you've started working on a fix, please set the status to Started.

Thanks for your time! To disable nags, add the Disable-Nags label.

For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot
Status: Fixed (was: Assigned)
Project Member

Comment 9 by sheriffbot@chromium.org, Feb 10 2017

Labels: -Restrict-View-SecurityTeam Restrict-View-SecurityNotify
Project Member

Comment 10 by sheriffbot@chromium.org, Feb 12 2017

Labels: Merge-Request-57
Project Member

Comment 11 by sheriffbot@chromium.org, Feb 13 2017

Labels: -Merge-Request-57 Hotlist-Merge-Approved Merge-Approved-57
Your change meets the bar and is auto-approved for M57. Please go ahead and merge the CL to branch 2987 manually. Please contact milestone owner if you have questions.
Owners: amineer@(clank), cmasso@(bling), ketakid@(cros), govind@(desktop)

For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot
Labels: -Merge-Approved-57
parent bug, not used for individual merges.

Labels: -Hotlist-Merge-Approved Merge-Rejected-57
(to keep sheriffbot quiet :-)
Project Member

Comment 14 by sheriffbot@chromium.org, May 19 2017

Labels: -Restrict-View-SecurityNotify allpublic
This bug has been closed for more than 14 weeks. Removing security view restrictions.

For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot

Comment 15 by dchan@google.com, May 30 2017

Labels: VerifyIn-60
Labels: VerifyIn-61

Comment 17 by dchan@chromium.org, Jan 22 2018

Status: Archived (was: Fixed)

Sign in to add a comment