From RedHat’s Bugzilla 1202855: “A flaw was found in the way pipe_iov_copy_from_user() and pipe_iov_copy_to_user() functions handled iovecs remaining len accounting on failed atomic access. An unprivileged local user could ‘use’ this flaw to crash the system or, potentially, escalate their privileges on the system.”
Just three days after reporting our findings, on March 18th, Google released an emergency patch addressing the vulnerability and exploit to the Android Open Source Project (AOSP).
Google’s advisory: http://source.android.com/security/advisory/2016-03-18.html
Fixes
Google has released a fix in the AOSP repository for multiple kernel versions. Android partners have been notified of these fixes and are encouraged to apply them. If further updates are required Google will publish them directly to AOSP.
Kernel Version | Patch |
3.4 | AOSP patch |
3.10 | AOSP patch |
3.14 | AOSP patch |
3.18+ | Patched in public Linux kernel |
Additional mitigations that were cited in the Android Advisory include:
Zimperium recommendations:
Zimperium also notified 30+ carriers and device manufacturers, members of the ZHA, of the advisory and emergency patch on March 18th. We encouraged our vendor members to heed the Google advisory recommendation to apply the fixes and our carrier members to release an update for the affected devices once an update is available.
Zimperium customers and partners are safe from this and many more device, network and application threats. zIPS detected this exploit as well as its associated device tampering and persistent OS modifications, providing detailed forensics without requiring an update or modification to our z9 engine. No further action is required on your behalf.
As a large proportion of devices are vulnerable to this exploit, it would not be surprising to see this exploit leveraged via other attack vectors (app, email, Stagefright, etc) in the near future.
We would like to thank the Google Security Team for this immediate analysis and patch. Three days from initial email to patch is impressive!