As I suspected some Android security flaws have been found on the kernel level so if you flash an update from Huawei/honor (B140 or B151) without flashing the boot.img file which include the kernel it is then mostly useless.
I watched at the Google Nexus Security bulletin and found one for april 2016 so I guess latest B151 update doesn't include these patches as we don't have any informations about what has been patched or not... Maybe yes, maybe no... ^^
http://ift.tt/20UB3nK
One is specifically severe as it allows Elevation of Privilege Vulnerability in Kernel as described here :
http://ift.tt/1UxG3OY
Summary
Google has become aware of a rooting application using an unpatched local elevation of privilege vulnerability in the kernel on some Android devices (CVE-2015-1805). For this application to affect a device, the user must first install it. Google already blocks installation of rooting applications that use this vulnerability — both within Google Play and outside of Google Play — using Verify Apps, and have updated our systems to detect applications that use this specific vulnerability.
To provide a final layer of defense for this issue, partners were provided with a patch for this issue on March 16, 2016. Nexus updates are being created and will be released within a few days. Source code patches for this issue have been released to the Android Open Source Project (AOSP) repository.
And also CVE-2014-9322 as they are considered as critical...
As the kernel version supplied on our Honor 5x is 3.10.49 I saw we're affected by this Security flaws. So I compared the latest fs/pipe.c supplied in the Android bulletin from april 2016 with the one from latest kernel from Huawei/Honor I could find and of course it wasn't patched...
Worse, isn't the only one as they are also Qualcomm Performance Module, Qualcomm RF Component, CVE-2014-9322 for "arch/x86/kernel/entry_64.S in the Linux kernel before 3.17.5 does not properly handle faults associated with the Stack Segment (SS) segment register, which allows local users to gain privileges by triggering an IRET instruction that leads to access to a GS Base address from the wrong space." and much other.
My intention isn't to create a panic or a paranoia around here but just to advise all of you what are the risks if you apply the Huawei/Honor security patches without flashing the boot.img file, and thus Huawei/honor should supply the latest patches very quick to other model ranges other than B24 and with the latest kernel source code version so we could work on it without re-introducing the flaws in custom kernels...
Thanks for your patience and your attention.
I watched at the Google Nexus Security bulletin and found one for april 2016 so I guess latest B151 update doesn't include these patches as we don't have any informations about what has been patched or not... Maybe yes, maybe no... ^^
http://ift.tt/20UB3nK
One is specifically severe as it allows Elevation of Privilege Vulnerability in Kernel as described here :
http://ift.tt/1UxG3OY
Summary
Google has become aware of a rooting application using an unpatched local elevation of privilege vulnerability in the kernel on some Android devices (CVE-2015-1805). For this application to affect a device, the user must first install it. Google already blocks installation of rooting applications that use this vulnerability — both within Google Play and outside of Google Play — using Verify Apps, and have updated our systems to detect applications that use this specific vulnerability.
To provide a final layer of defense for this issue, partners were provided with a patch for this issue on March 16, 2016. Nexus updates are being created and will be released within a few days. Source code patches for this issue have been released to the Android Open Source Project (AOSP) repository.
And also CVE-2014-9322 as they are considered as critical...
As the kernel version supplied on our Honor 5x is 3.10.49 I saw we're affected by this Security flaws. So I compared the latest fs/pipe.c supplied in the Android bulletin from april 2016 with the one from latest kernel from Huawei/Honor I could find and of course it wasn't patched...
Worse, isn't the only one as they are also Qualcomm Performance Module, Qualcomm RF Component, CVE-2014-9322 for "arch/x86/kernel/entry_64.S in the Linux kernel before 3.17.5 does not properly handle faults associated with the Stack Segment (SS) segment register, which allows local users to gain privileges by triggering an IRET instruction that leads to access to a GS Base address from the wrong space." and much other.
My intention isn't to create a panic or a paranoia around here but just to advise all of you what are the risks if you apply the Huawei/Honor security patches without flashing the boot.img file, and thus Huawei/honor should supply the latest patches very quick to other model ranges other than B24 and with the latest kernel source code version so we could work on it without re-introducing the flaws in custom kernels...
Thanks for your patience and your attention.
from xda-developers http://ift.tt/1VBMYan
via IFTTT
No comments:
Post a Comment