Vulnerability Details
CVE-2016-3847
Kernel nvavp driver heap write overflow (Android Security Bulletin - August 2016) CVSS Base Score: 8.8 CVSS Temporal Score: 7.9 CVSS Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C
CVE-2016-3815
Kernel camera driver stack read of user-controlled length (Android Security Bulletin - July 2016) CVSS Base Score: 7.9 CVSS Temporal Score: 7.1 CVSS Vector:CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N/E:P/RL:O/RC:C
CVE-2016-3873
Elevation of privilege vulnerability in NVIDIA kernel (Android Security Bulletin - September 2016) CVSS Base Score: 7.3 CVSS Temporal Score: 6.6 CVSS Vector: CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:H/A:L/E:P/RL:O/RC:C)
CVE-2016-3933
Elevation of privilege vulnerability in Mediaserver (Android Security Bulletin - October 2016) CVSS Base Score: 6.7 CVSS Temporal Score: 6.0 CVSS Vector: CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:L/I:H/A:N/E:P/RL:O/RC:C
CVE-2016-3844
Mediaserver libnvomx.so privilege escalation (Android Security Bulletin - August 2016) CVSS Base Score: 6.6 CVSS Temporal Score: 5.9 CVSS Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C
CVE-2016-3930
Elevation of privilege vulnerability in NVIDIA MMC test driver (Android Security Bulletin - October 2016) CVSS Base Score: 5.1 CVSS Temporal Score: 4.6 CVSS Vector: CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:N/E:P/RL:O/RC:C)
CVE-2016-3793
Kernel camera driver race condition use-after-free (Android Security Bulletin - July 2016) CVSS Base Score: 4.7 CVSS Temporal Score: 4.2 CVSS Vector:CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:H/A:N/E:P/RL:O/RC:C
CVE-2016-6677
Information disclosure vulnerability in NVIDIA GPU driver (Android Security Bulletin - October 2016) CVSS Base Score: 3.4 CVSS Temporal Score: 3.1 CVSS Vector:CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N/E:P/RL:O/RC:C
CVE-2016-3848
Kernel nvavp driver race condition privilege escalation (Android Security Bulletin - August 2016) CVSS Base Score: 2.5 CVSS Temporal Score: 2.3 CVSS Vector: CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N/E:P/RL:O/RC:C
CVE-2016-6686, CVE-2016-6687, CVE-2016-6688
Information disclosure vulnerability in NVIDIA profiler (Android Security Bulletin - October 2016) CVSS Base Score: 2.3 CVSS Temporal Score: 2.1 CVSS Vector:CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C
NVIDIA’s risk assessment is based on an average of risk across a diverse set of installed systems and may not represent the true risk of your local installation. NVIDIA recommends consulting a local security or IT professional to evaluate the risk of your specific configuration. NVIDIA doesn’t know of any exploits to these issues at this time.
Affected Products
CVE |
Product |
Impacted Installed Component |
OS |
CVE-2016-3793, CVE-2016-3847, CVE-2016-3848, CVE-2016-6677, CVE-2016-6686, CVE-2016-6687, CVE-2016-6688 |
Shield Tablet Shield Tablet TK1
|
Kernel |
Android |
CVE-2016-3815, CVE-2016-3873, CVE-2016-3930 |
Shield TV Shield Tablet Shield Tablet K1
|
Kernel |
Android |
CVE-2016-3844, CVE-2016-3933 |
Shield TV Shield Tablet Shield Tablet K1 |
libnvomx.so |
Android
|
Fixes
Fixes for SHIELD are available from Settings>About>System update.
Product | OS | Branch | First Version That Includes All the Fixes |
Shield TV | Android | Rel-24-foster-r7 | OTA 3.3 |
Shield Tablet | Android | Rel-24-sb-r1 | OTA 4.4 |
Shield Tablet K1 | Android | Rel-24-sb-r1 | OTA 1.5 |
Mitigations
None
Acknowledgements
• Nathan Crandall (@natecray) of Tesla Motors Product Security Team: CVE-2016-3847, CVE-2016-3848 • Peter Pi (@heisecode) of Trend Micro: CVE-2016-3793 • Scott Bauer (@ScottyBauer1): CVE-2016-3815 • Chiachih Wu (@chiachih_wu), Mingjian Zhou (@Mingjian_Zhou), and Xuxian Jiang of C0RE Team: CVE-2016-3844 • Sagi Kedmi, IBM Security X-Force Researcher: CVE-2016-3873 • Jianqiang Zhao (@jianqiangzhao) and pjf of IceSword Lab, Qihoo 360: CVE-2016-6688, CVE-2016-6677, CVE-2016-6687, CVE-2016-6686, CVE-2016-3930 • Mingjian Zhou (@Mingjian_Zhou), Chiachih Wu (@chiachih_wu), and Xuxian Jiang of C0RE Team: CVE-2016-3933
Revision History
Revision | Date | Description |
1.1 | December 5, 2016 | Corrected OTA versions in Fixes table |
1.0 | November 30, 2016 | Initial release |
Disclaimer
ALL NVIDIA INFORMATION, DESIGN SPECIFICATIONS, REFERENCE BOARDS, FILES, DRAWINGS, DIAGNOSTICS, LISTS, AND OTHER DOCUMENTS (TOGETHER AND SEPARATELY, “MATERIALS”) ARE BEING PROVIDED “AS IS.” NVIDIA MAKES NO WARRANTIES, EXPRESS, IMPLIED, STATUTORY, OR OTHERWISE WITH RESPECT TO THE MATERIALS, AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OR CONDITION OF TITLE, MERCHANTABILITY, SATISFACTORY QUALITY, FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT, ARE HEREBY EXCLUDED TO THE MAXIMUM EXTENT PERMITTED BY LAW.
Information furnished is believed to be accurate and reliable. However, NVIDIA Corporation assumes no responsibility for the consequences of use of such information or for any infringement of patents or other rights of third parties that may result from its use. No license is granted by implication or otherwise under any patent or patent rights of NVIDIA Corporation. Specifications mentioned in this publication are subject to change without notice. This publication supersedes and replaces all information previously supplied. NVIDIA Corporation products are not authorized for use as critical components in life support devices or systems without express written approval of NVIDIA Corporation.