Published April 03, 2017 | Updated April 27, 2017
The Android Security Bulletin contains details of security vulnerabilities affecting Android devices. Alongside the bulletin, we have released a security update to Nexus devices through an over-the-air (OTA) update. The Google device firmware images have also been released to the Google Developer site. Security patch levels of April 05, 2017 or later address all of these issues. Refer to the Pixel and Nexus update schedule to learn how to check a device's security patch level.
Partners were notified of the issues described in the bulletin on March 06, 2017 or earlier. Source code patches for these issues have been released to the Android Open Source Project (AOSP) repository and linked from this bulletin. This bulletin also includes links to patches outside of AOSP.
The most severe of these issues is a Critical security vulnerability that could enable remote code execution on an affected device through multiple methods such as email, web browsing, and MMS when processing media files. The severity assessment is based on the effect that exploiting the vulnerability would possibly have on an affected device, assuming the platform and service mitigations are disabled for development purposes or if successfully bypassed.
We have had no reports of active customer exploitation or abuse of these newly reported issues. Refer to the Android and Google service mitigations section for details on the Android security platform protections and service protections such as SafetyNet, which improve the security of the Android platform.
We encourage all customers to accept these updates to their devices.
This is a summary of the mitigations provided by the Android security platform and service protections such as SafetyNet. These capabilities reduce the likelihood that security vulnerabilities could be successfully exploited on Android.
We would like to thank these researchers for their contributions:
In the sections below, we provide details for each of the security vulnerabilities that apply to the 2017-04-01 patch level.There is a description of the issue, a severity rationale, and a table with the CVE, associated references, severity, updated Google devices, updated AOSP versions (where applicable), and date reported. When available, we will link the public change that addressed the issue to the bug ID, like the AOSP change list. When multiple changes relate to a single bug, additional references are linked to numbers following the bug ID.
A remote code execution vulnerability in Mediaserver could enable an attacker using a specially crafted file to cause memory corruption during media file and data processing. This issue is rated as Critical due to the possibility of remote code execution within the context of the Mediaserver process.
CVE | References | Severity | Updated Google devices | Updated AOSP versions | Date reported |
---|---|---|---|---|---|
CVE-2017-0538 | A-33641588 | Critical | All | 6.0, 6.0.1, 7.0, 7.1.1 | Dec 13, 2016 |
CVE-2017-0539 | A-33864300 | Critical | All | 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1 | Dec 23, 2016 |
CVE-2017-0541 | A-34031018 | Critical | All | 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1 | Jan 1, 2017 |
CVE-2017-0542 | A-33934721 | Critical | All | 6.0, 6.0.1, 7.0, 7.1.1 | Google internal |
CVE-2017-0543 | A-34097866 | Critical | All | 6.0, 6.0.1, 7.0, 7.1.1 | Google internal |
An elevation of privilege vulnerability in CameraBase could enable a local malicious application to execute arbitrary code. This issue is rated as High because it is a local arbitrary code execution in a privileged process.
CVE | References | Severity | Updated Google devices | Updated AOSP versions | Date reported |
---|---|---|---|---|---|
CVE-2017-0544 | A-31992879 | High | All | 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1 | Oct 6, 2016 |
An elevation of privilege vulnerability in Audioserver could enable a local malicious application to execute arbitrary code within the context of a privileged process. This issue is rated as High because it could be used to gain local access to elevated capabilities, which are not normally accessible to a third-party application.
CVE | References | Severity | Updated Google devices | Updated AOSP versions | Date reported |
---|---|---|---|---|---|
CVE-2017-0545 | A-32591350 | High | All | 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1 | Oct 31, 2016 |
An elevation of privilege vulnerability in SurfaceFlinger could enable a local malicious application to execute arbitrary code within the context of a privileged process. This issue is rated as High because it could be used to gain local access to elevated capabilities, which are not normally accessible to a third-party application.
CVE | References | Severity | Updated Google devices | Updated AOSP versions | Date reported |
---|---|---|---|---|---|
CVE-2017-0546 | A-32628763 | High | All | 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1 | Nov 2, 2016 |
An information disclosure vulnerability in Mediaserver could enable a local malicious application to access data outside of its permission levels. This issue is rated as High because it is a general bypass for operating system protections that isolate application data from other applications.
CVE | References | Severity | Updated Google devices | Updated AOSP versions | Date reported |
---|---|---|---|---|---|
CVE-2017-0547 | A-33861560 | High | All | 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1 | Dec 22, 2016 |
A remote denial of service vulnerability in libskia could enable an attacker to use a specially crafted file to cause a device hang or reboot. This issue is rated as High severity due to the possibility of remote denial of service.
CVE | References | Severity | Updated Google devices | Updated AOSP versions | Date reported |
---|---|---|---|---|---|
CVE-2017-0548 | A-33251605 | High | All | 7.0, 7.1.1 | Nov 29, 2016 |
A remote denial of service vulnerability in Mediaserver could enable an attacker to use a specially crafted file to cause a device hang or reboot. This issue is rated as High severity due to the possibility of remote denial of service.
CVE | References | Severity | Updated Google devices | Updated AOSP versions | Date reported |
---|---|---|---|---|---|
CVE-2017-0549 | A-33818508 | High | All | 6.0, 6.0.1, 7.0, 7.1.1 | Dec 20, 2016 |
CVE-2017-0550 | A-33933140 | High | All | 6.0, 6.0.1, 7.0, 7.1.1 | Google internal |
CVE-2017-0551 | A-34097231 [2] | High | All | 6.0, 6.0.1, 7.0, 7.1.1 | Google internal |
CVE-2017-0552 | A-34097915 | High | All | 6.0, 6.0.1, 7.0, 7.1.1 | Google internal |
An elevation of privilege vulnerability in libnl could enable a local malicious application to execute arbitrary code within the context of the Wi-Fi service. This issue is rated as Moderate because it first requires compromising a privileged process and is mitigated by current platform configurations.
CVE | References | Severity | Updated Google devices | Updated AOSP versions | Date reported |
---|---|---|---|---|---|
CVE-2017-0553 | A-32342065 | Moderate | All | 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1 | Oct 21, 2016 |
An elevation of privilege vulnerability in the Telephony component could enable a local malicious application to access capabilities outside of its permission levels. This issue is rated as Moderate because it could be used to gain access to elevated capabilities, which are not normally accessible to a third-party application.
CVE | References | Severity | Updated Google devices | Updated AOSP versions | Date reported |
---|---|---|---|---|---|
CVE-2017-0554 | A-33815946 [2] | Moderate | All | 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1 | Dec 20, 2016 |
An information disclosure vulnerability in Mediaserver could enable a local malicious application to access data outside of its permission levels. This issue is rated as Moderate because it could be used to access data without permission.
CVE | References | Severity | Updated Google devices | Updated AOSP versions | Date reported |
---|---|---|---|---|---|
CVE-2017-0555 | A-33551775 | Moderate | All | 6.0, 6.0.1, 7.0, 7.1.1 | Dec 12, 2016 |
CVE-2017-0556 | A-34093952 | Moderate | All | 6.0, 6.0.1, 7.0, 7.1.1 | Jan 4, 2017 |
CVE-2017-0557 | A-34093073 | Moderate | All | 6.0, 6.0.1, 7.0, 7.1.1 | Jan 4, 2017 |
CVE-2017-0558 | A-34056274 | Moderate | All | 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1 | Google internal |
An information disclosure vulnerability in libskia could enable a local malicious application to access data outside of its permission levels. This issue is rated as Moderate because it could be used to access data without permission.
CVE | References | Severity | Updated Google devices | Updated AOSP versions | Date reported |
---|---|---|---|---|---|
CVE-2017-0559 | A-33897722 | Moderate | All | 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1 | Dec 25, 2016 |
An information disclosure vulnerability in the factory reset process could enable a local malicious attacker to access data from the previous owner. This issue is rated as Moderate due to the possibility of bypassing device protection.
CVE | References | Severity | Updated Google devices | Updated AOSP versions | Date reported |
---|---|---|---|---|---|
CVE-2017-0560 | A-30681079 | Moderate | All | 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1 | Google internal |
In the sections below, we provide details for each of the security vulnerabilities that apply to the 2017-04-05 patch level. There is a description of the issue, a severity rationale, and a table with the CVE, associated references, severity, updated Google devices, updated AOSP versions (where applicable), and date reported. When available, we will link the public change that addressed the issue to the bug ID, like the AOSP change list. When multiple changes relate to a single bug, additional references are linked to numbers following the bug ID.
A remote code execution vulnerability in the Broadcom Wi-Fi firmware could enable a remote attacker to execute arbitrary code within the context of the Wi-Fi SoC. This issue is rated as Critical due to the possibility of remote code execution in the context of the Wi-Fi SoC.
CVE | References | Severity | Updated Google devices | Date reported |
---|---|---|---|---|
CVE-2017-0561 | A-34199105* B-RB#110814 |
Critical | Nexus 6, Nexus 6P, Nexus 9, Pixel C, Nexus Player | Jan 9, 2017 |
* The patch for this issue is not publicly available. The update is contained in the latest binary drivers for Nexus devices available from the Google Developer site.
A remote code execution vulnerability in the Qualcomm crypto engine driver could enable a remote attacker to execute arbitrary code within the context of the kernel. This issue is rated as Critical due to the possibility of remote code execution in the context of the kernel.
CVE | References | Severity | Updated Google devices | Date reported |
---|---|---|---|---|
CVE-2016-10230 | A-34389927 QC-CR#1091408 |
Critical | Nexus 5X, Nexus 6, Nexus 6P, Pixel, Pixel XL, Android One | Jan 10, 2017 |
A remote code execution vulnerability in the kernel networking subsystem could enable a remote attacker to execute arbitrary code within the context of the kernel. This issue is rated as Critical due to the possibility of remote code execution in the context of the kernel.
CVE | References | Severity | Updated Google devices | Date reported |
---|---|---|---|---|
CVE-2016-10229 | A-32813456 Upstream kernel |
Critical | Nexus 5X, Nexus 6, Nexus 6P, Pixel, Pixel XL, Pixel C, Android One, Nexus Player | Google internal |
An elevation of privilege vulnerability in the MediaTek touchscreen driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Critical due to the possibility of a local permanent device compromise, which may require reflashing the operating system to repair the device.
CVE | References | Severity | Updated Google devices | Date reported |
---|---|---|---|---|
CVE-2017-0562 | A-30202425* M-ALPS02898189 |
Critical* | None** | Jul 16, 2016 |
* The patch for this issue is not publicly available. The update is contained in the latest binary drivers for Nexus devices available from the Google Developer site.
** Supported Google devices on Android 7.0 or later that have installed all available updates are not affected by this vulnerability.
An elevation of privilege vulnerability in the HTC touchscreen driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Critical due to the possibility of a local permanent device compromise, which may require reflashing the operating system to repair the device.
CVE | References | Severity | Updated Google devices | Date reported |
---|---|---|---|---|
CVE-2017-0563 | A-32089409* |
Critical | Nexus 9 | Oct 9, 2016 |
* The patch for this issue is not publicly available. The update is contained in the latest binary drivers for Nexus devices available from the Google Developer site.
An elevation of privilege vulnerability in the kernel ION subsystem could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Critical due to the possibility of a local permanent device compromise, which may require reflashing the operating system to repair the device.
CVE | References | Severity | Updated Google devices | Date reported |
---|---|---|---|---|
CVE-2017-0564 | A-34276203* |
Critical | Nexus 5X, Nexus 6, Nexus 6P, Pixel, Pixel XL, Pixel C, Android One, Nexus Player | Jan 12, 2017 |
* The patch for this issue is not publicly available. The update is contained in the latest binary drivers for Nexus devices available from the Google Developer site.
These vulnerabilities affect Qualcomm components and are described in further detail in the Qualcomm AMSS October 2016 security bulletin.
CVE | References | Severity | Updated Google devices | Date reported |
---|---|---|---|---|
CVE-2016-10237 | A-31628601** QC-CR#1046751 |
Critical | None** | Qualcomm internal |
CVE-2016-10238 | A-35358527** QC-CR#1042558 |
Critical | None*** | Qualcomm internal |
CVE-2016-10239 | A-31624618** QC-CR#1032929 |
High | Pixel, Pixel XL | Qualcomm internal |
* The severity rating for these vulnerabilities was determined by the vendor.
* The patch for this issue is not publicly available. The update is contained in the latest binary drivers for Nexus devices available from the Google Developer site.
*** Supported Google devices on Android 7.0 or later that have installed all available updates are not affected by this vulnerability.
A remote code execution vulnerability in v8 could enable remote attackers to execute arbitrary code within the context of a privileged process. This issue is rated as High due to the possibility of remote code execution in websites.
CVE | References | Severity | Updated Google devices | Updated AOSP versions | Date reported |
---|---|---|---|---|---|
CVE-2016-5129 | A-29178923 | High | None* | 6.0, 6.0.1, 7.0 | Jul 20, 2016 |
* Supported Google devices on Android 7.0 or later that have installed all available updates are not affected by this vulnerability.
A remote code execution vulnerability in Freetype could enable a local malicious application to load a specially crafted font to cause memory corruption in an unprivileged process. This issue is rated as High due to the possibility of remote code execution in an application that uses this library.
CVE | References | Severity | Updated Google devices | Updated AOSP versions | Date reported |
---|---|---|---|---|---|
CVE-2016-10244 | A-31470908 | High | None* | 4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0 | Sep 13, 2016 |
* Supported Google devices on Android 7.0 or later that have installed all available updates are not affected by this vulnerability.
An elevation of privilege vulnerability in the kernel sound subsystem could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process.
CVE | References | Severity | Updated Google devices | Date reported |
---|---|---|---|---|
CVE-2014-4656 | A-34464977 Upstream kernel |
High | Nexus 6, Nexus Player | Jun 26, 2014 |
An elevation of privilege vulnerability in the NVIDIA crypto driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process.
CVE | References | Severity | Updated Google devices | Date reported |
---|---|---|---|---|
CVE-2017-0339 | A-27930566* N-CVE-2017-0339 |
High | Nexus 9 | Mar 29, 2016 |
CVE-2017-0332 | A-33812508* N-CVE-2017-0332 |
High | Nexus 9 | Dec 21, 2016 |
CVE-2017-0327 | A-33893669* N-CVE-2017-0327 |
High | Nexus 9 | Dec 24, 2016 |
* The patch for this issue is not publicly available. The update is contained in the latest binary drivers for Nexus devices available from the Google Developer site.
An elevation of privilege vulnerability in the MediaTek thermal driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process.
CVE | References | Severity | Updated Google devices | Date reported |
---|---|---|---|---|
CVE-2017-0565 | A-28175904* M-ALPS02696516 |
High | None** | Apr 11, 2016 |
* The patch for this issue is not publicly available. The update is contained in the latest binary drivers for Nexus devices available from the Google Developer site.
** Supported Google devices on Android 7.0 or later that have installed all available updates are not affected by this vulnerability.
An elevation of privilege vulnerability in the MediaTek camera driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process.
CVE | References | Severity | Updated Google devices | Date reported |
---|---|---|---|---|
CVE-2017-0566 | A-28470975* M-ALPS02696367 |
High | None** | Apr 29, 2016 |
* The patch for this issue is not publicly available. The update is contained in the latest binary drivers for Nexus devices available from the Google Developer site.
** Supported Google devices on Android 7.0 or later that have installed all available updates are not affected by this vulnerability.
An elevation of privilege vulnerability in the Broadcom Wi-Fi driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process.
CVE | References | Severity | Updated Google devices | Date reported |
---|---|---|---|---|
CVE-2017-0567 | A-32125310* B-RB#112575 |
High | Nexus 6, Nexus 6P, Nexus 9, Pixel C, Nexus Player | Oct 12, 2016 |
CVE-2017-0568 | A-34197514* B-RB#112600 |
High | Nexus 6, Nexus 6P, Nexus 9, Pixel C, Nexus Player | Jan 9, 2017 |
CVE-2017-0569 | A-34198729* B-RB#110666 |
High | Nexus 6, Nexus 6P, Nexus 9, Pixel C, Nexus Player | Jan 9, 2017 |
CVE-2017-0570 | A-34199963* B-RB#110688 |
High | Nexus 6, Nexus 6P, Nexus 9, Pixel C, Nexus Player | Jan 9, 2017 |
CVE-2017-0571 | A-34203305* B-RB#111541 |
High | Nexus 6, Nexus 6P, Pixel C, Nexus Player | Jan 9, 2017 |
CVE-2017-0572 | A-34198931* B-RB#112597 |
High | None** | Jan 9, 2017 |
CVE-2017-0573 | A-34469904* B-RB#91539 |
High | Nexus 6, Nexus 6P, Nexus 9, Pixel C, Nexus Player | Jan 18, 2017 |
CVE-2017-0574 | A-34624457* B-RB#113189 |
High | Nexus 6, Nexus 6P, Nexus 9, Pixel C | Jan 22, 2017 |
* The patch for this issue is not publicly available. The update is contained in the latest binary drivers for Nexus devices available from the Google Developer site.
** Supported Google devices on Android 7.0 or later that have installed all available updates are not affected by this vulnerability.
An elevation of privilege vulnerability in the Qualcomm Wi-Fi driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process.
CVE | References | Severity | Updated Google devices | Date reported |
---|---|---|---|---|
CVE-2017-0575 | A-32658595* QC-CR#1103099 |
High | Nexus 5X, Pixel, Pixel XL | Nov 3, 2016 |
* The patch for this issue is not publicly available. The update is contained in the latest binary drivers for Nexus devices available from the Google Developer site.
An elevation of privilege vulnerability in the NVIDIA I2C HID driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process.
CVE | References | Severity | Updated Google devices | Date reported |
---|---|---|---|---|
CVE-2017-0325 | A-33040280* N-CVE-2017-0325 |
High | Nexus 9, Pixel C | Nov 20, 2016 |
* The patch for this issue is not publicly available. The update is contained in the latest binary drivers for Nexus devices available from the Google Developer site.
An elevation of privilege vulnerability in the Qualcomm audio driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process.
CVE | References | Severity | Updated Google devices | Date reported |
---|---|---|---|---|
CVE-2017-0454 | A-33353700 QC-CR#1104067 |
High | Nexus 5X, Nexus 6P, Pixel, Pixel XL | Dec 5, 2016 |
An elevation of privilege vulnerability in the Qualcomm crypto engine driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process.
CVE | References | Severity | Updated Google devices | Date reported |
---|---|---|---|---|
CVE-2017-0576 | A-33544431 QC-CR#1103089 |
High | Nexus 5X, Nexus 6, Nexus 6P, Pixel, Pixel XL, Android One | Dec 9, 2016 |
An elevation of privilege vulnerability in the HTC touchscreen driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process.
CVE | References | Severity | Updated Google devices | Date reported |
---|---|---|---|---|
CVE-2017-0577 | A-33842951* |
High | None** | Dec 21, 2016 |
* The patch for this issue is not publicly available. The update is contained in the latest binary drivers for Nexus devices available from the Google Developer site.
** Supported Google devices on Android 7.0 or later that have installed all available updates are not affected by this vulnerability.
An elevation of privilege vulnerability in the DTS sound driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process.
CVE | References | Severity | Updated Google devices | Date reported |
---|---|---|---|---|
CVE-2017-0578 | A-33964406* |
High | None** | Dec 28, 2016 |
* The patch for this issue is not publicly available. The update is contained in the latest binary drivers for Nexus devices available from the Google Developer site.
** Supported Google devices on Android 7.0 or later that have installed all available updates are not affected by this vulnerability.
An elevation of privilege vulnerability in the Qualcomm sound codec driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process.
CVE | References | Severity | Updated Google devices | Date reported |
---|---|---|---|---|
CVE-2016-10231 | A-33966912 QC-CR#1096799 |
High | Pixel, Pixel XL | Dec 29, 2016 |
An elevation of privilege vulnerability in the Qualcomm video driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process.
CVE | References | Severity | Updated Google devices | Date reported |
---|---|---|---|---|
CVE-2017-0579 | A-34125463* QC-CR#1115406 |
High | Nexus 5X, Nexus 6P, Pixel, Pixel XL | Jan 5, 2017 |
CVE-2016-10232 | A-34386696 QC-CR#1024872 [2] |
High | Nexus 5X, Nexus 6P, Pixel, Pixel XL, Android One | Jan 10, 2017 |
CVE-2016-10233 | A-34389926 QC-CR#897452 |
High | None** | Jan 10, 2017 |
* The patch for this issue is not publicly available. The update is contained in the latest binary drivers for Nexus devices available from the Google Developer site.
** Supported Google devices on Android 7.0 or later that have installed all available updates are not affected by this vulnerability.
An elevation of privilege vulnerability in the NVIDIA boot and power management processor driver could enable a local malicious application to execute arbitrary code within the context of the boot and power management processor. This issue is rated as High because it first requires compromising a privileged process.
CVE | References | Severity | Updated Google devices | Date reported |
---|---|---|---|---|
CVE-2017-0329 | A-34115304* N-CVE-2017-0329 |
High | Pixel C | Jan 5, 2017 |
* The patch for this issue is not publicly available. The update is contained in the latest binary drivers for Nexus devices available from the Google Developer site.
An elevation of privilege vulnerability in the Synaptics Touchscreen driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process.
CVE | References | Severity | Updated Google devices | Date reported |
---|---|---|---|---|
CVE-2017-0580 | A-34325986* |
High | None** | Jan 16, 2017 |
CVE-2017-0581 | A-34614485* |
High | None** | Jan 22, 2017 |
* The patch for this issue is not publicly available. The update is contained in the latest binary drivers for Nexus devices available from the Google Developer site.
** Supported Google devices on Android 7.0 or later that have installed all available updates are not affected by this vulnerability.
An elevation of privilege vulnerability in the Qualcomm Seemp driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process.
CVE | References | Severity | Updated Google devices | Date reported |
---|---|---|---|---|
CVE-2017-0462 | A-33353601 QC-CR#1102288 |
High | Pixel, Pixel XL | Google internal |
An elevation of privilege vulnerability in the Qualcomm Kyro L2 driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process.
CVE | References | Severity | Updated Google devices | Date reported |
---|---|---|---|---|
CVE-2017-6423 | A-32831370 QC-CR#1103158 |
High | Pixel, Pixel XL | Google internal |
An elevation of privilege vulnerability in the kernel file system could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privileged process.
CVE | References | Severity | Updated Google devices | Date reported |
---|---|---|---|---|
CVE-2014-9922 | A-32761463 Upstream kernel |
High | Nexus 5X, Nexus 6, Nexus 6P, Nexus 9, Pixel, Pixel XL, Pixel C, Android One, Nexus Player | Oct 24, 2014 |
An information disclosure vulnerability in the kernel memory subsystem could enable a local malicious application to access data outside of its permission levels. This issue is rated as High because it could be used to access sensitive data without explicit user permission.
CVE | References | Severity | Updated Google devices | Date reported |
---|---|---|---|---|
CVE-2014-0206 | A-34465735 Upstream kernel |
High | Nexus 6, Nexus Player | May 6, 2014 |
An information disclosure vulnerability in the kernel networking subsystem could enable a local malicious application to access data outside of its permission levels. This issue is rated as High because it could be used to access sensitive data without explicit user permission.
CVE | References | Severity | Updated Google devices | Date reported |
---|---|---|---|---|
CVE-2014-3145 | A-34469585 Upstream kernel [2] |
High | Nexus 6, Nexus Player | May 9, 2014 |
An information disclosure vulnerability in the Qualcomm TrustZone could enable a local malicious application to access data outside of its permission levels. This issue is rated as High because it could be used to access sensitive data without explicit user permission.
CVE | References | Severity | Updated Google devices | Date reported |
---|---|---|---|---|
CVE-2016-5349 | A-29083830 QC-CR#1021945 [2] [3] [4] |
High | Nexus 5X, Nexus 6, Nexus 6P, Pixel, Pixel XL, Android One | Jun 1, 2016 |
An information disclosure vulnerability in the Qualcomm IPA driver could enable a local malicious application to access data outside of its permission levels. This issue is rated as High because it could be used to access sensitive data without explicit user permission.
CVE | References | Severity | Updated Google devices | Date reported |
---|---|---|---|---|
CVE-2016-10234 | A-34390017 QC-CR#1069060 [2] |
High | Nexus 5X, Nexus 6P, Pixel, Pixel XL | Jan 10, 2017 |
A denial of service vulnerability in the kernel networking subsystem could enable a remote attacker to use a specially crafted network packet to cause a device hang or reboot. This issue is rated as High due to the possibility of remote denial of service.
CVE | References | Severity | Updated Google devices | Date reported |
---|---|---|---|---|
CVE-2014-2706 | A-34160553 Upstream kernel |
High | Nexus Player | Apr 1, 2014 |
A denial of service vulnerability in the Qualcomm Wi-Fi driver could enable a proximate attacker to cause a denial of service in the Wi-Fi subsystem. This issue is rated as High due to the possibility of remote denial of service.
CVE | References | Severity | Updated Google devices | Date reported |
---|---|---|---|---|
CVE-2016-10235 | A-34390620 QC-CR#1046409 |
High | None** | Jan 10, 2017 |
** Supported Google devices on Android 7.0 or later that have installed all available updates are not affected by this vulnerability.
An elevation of privilege vulnerability in the kernel file system could enable a local malicious application to execute arbitrary code outside of its permission levels. This issue is rated as Moderate because it first requires compromising a privileged process and is mitigated by current platform configurations.
CVE | References | Severity | Updated Google devices | Date reported |
---|---|---|---|---|
CVE-2016-7097 | A-32458736 Upstream kernel |
Moderate | Nexus 5X, Nexus 6, Nexus 6P, Nexus 9, Pixel, Pixel XL, Pixel C, Nexus Player | Aug 28, 2016 |
An elevation of privilege vulnerability in the Qualcomm Wi-Fi driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Moderate because it first requires compromising a privileged process and because of vulnerability specific details which limit the impact of the issue.
CVE | References | Severity | Updated Google devices | Date reported |
---|---|---|---|---|
CVE-2017-6424 | A-32086742 QC-CR#1102648 |
Moderate | Nexus 5X, Pixel, Pixel XL, Android One | Oct 9, 2016 |
An elevation of privilege vulnerability in the Broadcom Wi-Fi driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Moderate because it first requires compromising a privileged process and is mitigated by current platform configurations.
CVE | References | Severity | Updated Google devices | Date reported |
---|---|---|---|---|
CVE-2016-8465 | A-32474971* B-RB#106053 |
Moderate | Nexus 6, Nexus 6P, Nexus 9, Pixel C, Nexus Player | Oct 27, 2016 |
* The patch for this issue is not publicly available. The update is contained in the latest binary drivers for Nexus devices available from the Google Developer site.
An elevation of privilege vulnerability in the HTC OEM fastboot command could enable a local malicious application to execute arbitrary code within the context of the sensor hub. This issue is rated as Moderate because it first requires exploitation of separate vulnerabilities.
CVE | References | Severity | Updated Google devices | Date reported |
---|---|---|---|---|
CVE-2017-0582 | A-33178836* |
Moderate | Nexus 9 | Nov 28, 2016 |
* The patch for this issue is not publicly available. The update is contained in the latest binary drivers for Nexus devices available from the Google Developer site.
An elevation of privilege vulnerability in the Qualcomm CP access driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as Moderate because it first requires compromising a privileged process and because of vulnerability specific details which limit the impact of the issue.
CVE | References | Severity | Updated Google devices | Date reported |
---|---|---|---|---|
CVE-2017-0583 | A-32068683 QC-CR#1103788 |
Moderate | Nexus 5X, Nexus 6P, Pixel, Pixel XL, Android One | Google internal |
An information disclosure vulnerability in the kernel media driver could enable a local malicious application to access data outside of its permission levels. This issue is rated as Moderate because it first requires compromising a privileged process.
CVE | References | Severity | Updated Google devices | Date reported |
---|---|---|---|---|
CVE-2014-1739 | A-34460642 Upstream kernel |
Moderate | Nexus 6, Nexus 9, Nexus Player | Jun 15, 2014 |
An information disclosure vulnerability in the Qualcomm Wi-Fi driver could enable a local malicious application to access data outside of its permission levels. This issue is rated as Moderate because it first requires compromising a privileged process.
CVE | References | Severity | Updated Google devices | Date reported |
---|---|---|---|---|
CVE-2017-0584 | A-32074353* QC-CR#1104731 |
Moderate | Nexus 5X, Pixel, Pixel XL | Oct 9, 2016 |
* The patch for this issue is not publicly available. The update is contained in the latest binary drivers for Nexus devices available from the Google Developer site.
An information disclosure vulnerability in the Broadcom Wi-Fi driver could enable a local malicious application to access data outside of its permission levels. This issue is rated as Moderate because it first requires compromising a privileged process.
CVE | References | Severity | Updated Google devices | Date reported |
---|---|---|---|---|
CVE-2017-0585 | A-32475556* B-RB#112953 |
Moderate | Nexus 6, Nexus 6P, Nexus 9, Pixel C, Nexus Player | Oct 27, 2016 |
* The patch for this issue is not publicly available. The update is contained in the latest binary drivers for Nexus devices available from the Google Developer site.
An information disclosure vulnerability in the Qualcomm Avtimer driver could enable a local malicious application to access data outside of its permission levels. This issue is rated as Moderate because it first requires compromising a privileged process.
CVE | References | Severity | Updated Google devices | Date reported |
---|---|---|---|---|
CVE-2016-5346 | A-32551280 QC-CR#1097878 |
Moderate | Pixel, Pixel XL | Oct 29, 2016 |
An information disclosure vulnerability in the Qualcomm video driver could enable a local malicious application to access data outside of its permission levels. This issue is rated as Moderate because it first requires compromising a privileged process.
CVE | References | Severity | Updated Google devices | Date reported |
---|---|---|---|---|
CVE-2017-6425 | A-32577085 QC-CR#1103689 |
Moderate | Pixel, Pixel XL | Oct 29, 2016 |
An information disclosure vulnerability in the Qualcomm USB driver could enable a local malicious application to access data outside of its permission levels. This issue is rated as Moderate because it first requires compromising a privileged process.
CVE | References | Severity | Updated Google devices | Date reported |
---|---|---|---|---|
CVE-2016-10236 | A-33280689 QC-CR#1102418 |
Moderate | Pixel, Pixel XL | Nov 30, 2016 |
An information disclosure vulnerability in the Qualcomm sound driver could enable a local malicious application to access data outside of its permission levels. This issue is rated as Moderate because it first requires compromising a privileged process.
CVE | References | Severity | Updated Google devices | Date reported |
---|---|---|---|---|
CVE-2017-0586 | A-33649808 QC-CR#1097569 |
Moderate | Nexus 5X, Nexus 6, Nexus 6P, Pixel, Pixel XL, Android One | Dec 13, 2016 |
An information disclosure vulnerability in the Qualcomm SPMI driver could enable a local malicious application to access data outside of its permission levels. This issue is rated as Moderate because it first requires compromising a privileged process.
CVE | References | Severity | Updated Google devices | Date reported |
---|---|---|---|---|
CVE-2017-6426 | A-33644474 QC-CR#1106842 |
Moderate | Pixel, Pixel XL | Dec 14, 2016 |
An information disclosure vulnerability in the NVIDIA crypto driver could enable a local malicious application to access data outside of its permission levels. This issue is rated as Moderate because it first requires compromising a privileged process.
CVE | References | Severity | Updated Google devices | Date reported |
---|---|---|---|---|
CVE-2017-0328 | A-33898322* N-CVE-2017-0328 |
Moderate | None** | Dec 24, 2016 |
CVE-2017-0330 | A-33899858* N-CVE-2017-0330 |
Moderate | None** | Dec 24, 2016 |
* The patch for this issue is not publicly available. The update is contained in the latest binary drivers for Nexus devices available from the Google Developer site.
** Supported Google devices on Android 7.0 or later that have installed all available updates are not affected by this vulnerability.
These vulnerabilities affecting Qualcomm components were released as part of Qualcomm AMSS security bulletins between 2014–2016. They are included in this Android security bulletin to associate their fixes with an Android security patch level.
CVE | References | Severity | Updated Google devices | Date reported |
---|---|---|---|---|
CVE-2014-9931 | A-35445101** QC-CR#612410 |
Critical | None** | Qualcomm internal |
CVE-2014-9932 | A-35434683** QC-CR#626734 |
Critical | Pixel, Pixel XL | Qualcomm internal |
CVE-2014-9933 | A-35442512 QC-CR#675463 |
Critical | None** | Qualcomm internal |
CVE-2014-9934 | A-35439275** QC-CR#658249 |
Critical | None** | Qualcomm internal |
CVE-2014-9935 | A-35444951** QC-CR#717626 |
Critical | None** | Qualcomm internal |
CVE-2014-9936 | A-35442420** QC-CR#727389 |
Critical | None** | Qualcomm internal |
CVE-2014-9937 | A-35445102** QC-CR#734095 |
Critical | None** | Qualcomm internal |
CVE-2015-8995 | A-35445002** QC-CR#733690 |
Critical | None** | Qualcomm internal |
CVE-2015-8996 | A-35444658** QC-CR#734698 |
Critical | None** | Qualcomm internal |
CVE-2015-8997 | A-35432947** QC-CR#734707 |
Critical | None** | Qualcomm internal |
CVE-2015-8998 | A-35441175** QC-CR#735337 |
Critical | None** | Qualcomm internal |
CVE-2015-8999 | A-35445401** QC-CR#736119 |
Critical | None** | Qualcomm internal |
CVE-2015-9000 | A-35441076** QC-CR#740632 |
Critical | None** | Qualcomm internal |
CVE-2015-9001 | A-35445400** QC-CR#736083 |
Critical | None** | Qualcomm internal |
CVE-2015-9002 | A-35442421** QC-CR#748428 |
Critical | None** | Qualcomm internal |
CVE-2015-9003 | A-35440626** QC-CR#749215 |
Critical | None** | Qualcomm internal |
CVE-2016-10242 | A-35434643** QC-CR#985139 |
Critical | None** | Qualcomm internal |
* The severity rating for these vulnerabilities was determined by the vendor.
* The patch for this issue is not publicly available. The update is contained in the latest binary drivers for Nexus devices available from the Google Developer site.
*** Supported Google devices on Android 7.0 or later that have installed all available updates are not affected by this vulnerability.
This section answers common questions that may occur after reading this bulletin.
1. How do I determine if my device is updated to address these issues?
To learn how to check a device's security patch level, read the instructions on the Pixel and Nexus update schedule.
Device manufacturers that include these updates should set the patch string level to:
2. Why does this bulletin have two security patch levels?
This bulletin has two security patch levels so that Android partners have the flexibility to fix a subset of vulnerabilities that are similar across all Android devices more quickly. Android partners are encouraged to fix all issues in this bulletin and use the latest security patch level.
Partners are encouraged to bundle the fixes for all issues they are addressing in a single update.
3. How do I determine which Google devices are affected by each issue?
In the 2017-04-01 and 2017-04-05 security vulnerability details sections, each table has an Updated Google devices column that covers the range of affected Google devices updated for each issue. This column has a few options:
4. What do the entries in the references column map to?
Entries under the References column of the vulnerability details table may contain a prefix identifying the organization to which the reference value belongs. These prefixes map as follows:
Prefix | Reference |
---|---|
A- | Android bug ID |
QC- | Qualcomm reference number |
M- | MediaTek reference number |
N- | NVIDIA reference number |
B- | Broadcom reference number |