Vulnerability Name: | CVE-2016-2061 (CCN-114453) | ||||||||||||||||||||
Assigned: | 2016-06-08 | ||||||||||||||||||||
Published: | 2016-06-08 | ||||||||||||||||||||
Updated: | 2020-08-04 | ||||||||||||||||||||
Summary: | Integer signedness error in the MSM V4L2 video driver for the Linux kernel 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, allows attackers to gain privileges or cause a denial of service (array overflow and memory corruption) via a crafted application that triggers an msm_isp_axi_create_stream call. | ||||||||||||||||||||
CVSS v3 Severity: | 7.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) 6.8 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
7.3 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
| ||||||||||||||||||||
CVSS v2 Severity: | 6.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P)
| ||||||||||||||||||||
Vulnerability Type: | CWE-269 | ||||||||||||||||||||
Vulnerability Consequences: | Gain Privileges | ||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2016-2061 Source: CCN Type: Android Open Source Project Android Security BulletinJune 2016 Source: CONFIRM Type: Vendor Advisory http://source.android.com/security/bulletin/2016-06-01.html Source: XF Type: UNKNOWN linux-kernel-cve20162061-priv-esc(114453) Source: CONFIRM Type: Mailing List, Third Party Advisory https://us.codeaurora.org/cgit/quic/la//kernel/msm-3.18/commit/id=79db14ca9f791a14be9376a0340ad3b9b9a4d603 Source: CCN Type: Code Aurora QCIR-QCIR-2016-00014-1 Array Overflow in MSM V4L2 Video Driver Allows Kernel Memory Corruption (CVE-2016-2061) Source: CONFIRM Type: Broken Link https://www.codeaurora.org/array-overflow-msm-v4l2-video-driver-allows-kernel-memory-corruption-cve-2016-2061 | ||||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Denotes that component is vulnerable | ||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||
| |||||||||||||||||||||
BACK |