1 <html devsite> 2 <head> 3 <title>Android Security BulletinOctober 2016</title> 4 <meta name="project_path" value="/_project.yaml" /> 5 <meta name="book_path" value="/_book.yaml" /> 6 </head> 7 <body> 8 <!-- 9 Copyright 2017 The Android Open Source Project 10 11 Licensed under the Apache License, Version 2.0 (the "License"); 12 you may not use this file except in compliance with the License. 13 You may obtain a copy of the License at 14 15 http://www.apache.org/licenses/LICENSE-2.0 16 17 Unless required by applicable law or agreed to in writing, software 18 distributed under the License is distributed on an "AS IS" BASIS, 19 WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 20 See the License for the specific language governing permissions and 21 limitations under the License. 22 --> 23 24 25 <p><em>Published October 03, 2016 | Updated October 04, 2016</em> 26 </p> 27 <p> 28 The Android Security Bulletin contains details of security vulnerabilities 29 affecting Android devices. Alongside the bulletin, we have released a security 30 update to Nexus devices through an over-the-air (OTA) update. The Nexus firmware 31 images have also been released to the 32 <a href="https://developers.google.com/android/nexus/images">Google Developer 33 site</a>. Security Patch Levels of October 05, 2016 or later address these 34 issues. Refer to the 35 <a href="https://support.google.com/nexus/answer/4457705#nexus_devices">documentation</a> 36 to learn how to check the security patch level. Supported Nexus devices will 37 receive a single OTA update with the October 05, 2016 security patch level. 38 </p> 39 <p> 40 Partners were notified about the issues described in the bulletin on September 41 06, 2016 or earlier. Where applicable, source code patches for these issues 42 have been released to the Android Open Source Project (AOSP) repository. This 43 bulletin also includes links to patches outside of AOSP. 44 </p> 45 <p> 46 The most severe of these issues are Critical security vulnerabilities in 47 device-specific code that could enable remote code execution within the context 48 of the kernel, leading to the possibility of a local permanent device 49 compromise, which may require reflashing the operating system to repair the 50 device. The <a href="/security/overview/updates-resources.html#severity">severity 51 assessment</a> is based on the effect that exploiting the vulnerability would 52 possibly have on an affected device, assuming the platform and service 53 mitigations are disabled for development purposes or if successfully bypassed. 54 </p> 55 <p> 56 We have had no reports of active customer exploitation or abuse of these newly 57 reported issues. Refer to the <a href="#mitigations">Android and Google service 58 mitigations</a> section for details on the 59 <a href="/security/enhancements/index.html">Android 60 security platform protections</a> and service protections such as 61 <a href="https://developer.android.com/training/safetynet/index.html">SafetyNet</a>, 62 which improve the security of the Android platform. 63 </p> 64 <p> 65 We encourage all customers to accept these updates to their devices. 66 </p> 67 <h2 id="announcements">Announcements</h2> 68 <ul> 69 <li>This bulletin has two security patch level strings to provide Android 70 partners with the flexibility to more quickly fix a subset of vulnerabilities 71 that are similar across all Android devices. See 72 <a href="#common-questions-and-answers">Common questions and answers</a> for 73 additional information: 74 <ul> 75 <li><strong>2016-10-01</strong>: Partial security patch level string. This 76 security patch level string indicates that all issues associated with 2016-10-01 77 (and all previous security patch level strings) are addressed.</li> 78 <li><strong>2016-10-05</strong>: Complete security patch level string. This 79 security patch level string indicates that all issues associated with 2016-10-01 80 and 2016-10-05 (and all previous security patch level strings) are addressed.</li> 81 </ul> 82 </li> 83 <li>Supported Nexus devices will receive a single OTA update with the October 84 05, 2016 security patch level.</li> 85 </ul> 86 87 <h2 id="mitigations">Android and Google service mitigations</h2> 88 <p> 89 This is a summary of the mitigations provided by the 90 <a href="/security/enhancements/index.html">Android 91 security platform</a> and service protections such as SafetyNet. These 92 capabilities reduce the likelihood that security vulnerabilities could be 93 successfully exploited on Android. 94 </p> 95 <ul> 96 <li>Exploitation for many issues on Android is made more difficult by 97 enhancements in newer versions of the Android platform. We encourage all users 98 to update to the latest version of Android where possible.</li> 99 <li>The Android Security team actively monitors for abuse with <a 100 href="http://static.googleusercontent.com/media/source.android.com/en//security/reports/Google_Android_Security_2015_Report_Final.pdf">Verify 101 Apps and SafetyNet</a>, which are designed to warn users about <a 102 href="http://static.googleusercontent.com/media/source.android.com/en//security/reports/Google_Android_Security_PHA_classifications.pdf">Potentially 103 Harmful Applications</a>. Verify Apps is enabled by default on devices with <a 104 href="http://www.android.com/gms">Google Mobile Services</a>, and is especially 105 important for users who install applications from outside of Google Play. Device 106 rooting tools are prohibited within Google Play, but Verify Apps warns users 107 when they attempt to install a detected rooting applicationno matter where it 108 comes from. Additionally, Verify Apps attempts to identify and block 109 installation of known malicious applications that exploit a privilege escalation 110 vulnerability. If such an application has already been installed, Verify Apps 111 will notify the user and attempt to remove the detected application.</li> 112 <li>As appropriate, Google Hangouts and Messenger applications do not 113 automatically pass media to processes such as Mediaserver.</li> 114 </ul> 115 <h2 id="acknowledgements">Acknowledgements</h2> 116 <p> 117 We would like to thank these researchers for their contributions: 118 </p> 119 <ul> 120 <li>Andre Teixeira Rizzo: CVE-2016-3882</li> 121 <li>Andrea Biondo: CVE-2016-3921</li> 122 <li>Daniel Micay of Copperhead Security: CVE-2016-3922</li> 123 <li><a href="https://github.com/google/syzkaller">Dmitry Vyukov</a> of Google: 124 CVE-2016-7117</li> 125 <li>dosomder: CVE-2016-3931</li> 126 <li>Ecular Xu () of Trend Micro: CVE-2016-3920</li> 127 <li>Gengjia Chen (<a href="https://twitter.com/chengjia4574">@chengjia4574</a>) 128 and <a href="http://weibo.com/jfpan">pjf</a> of IceSword Lab, Qihoo 360 129 Technology Co. Ltd.: CVE-2016-6690, CVE-2016-3901, CVE-2016-6672, CVE-2016-3940, 130 CVE-2016-3935</li> 131 <li><a href="mailto:hzhan033 (a] ucr.edu">Hang Zhang</a>, 132 <a href="mailto:dshe002 (a] ucr.edu">Dongdong She</a>, and 133 <a href="mailto:zhiyunq (a] cs.ucr.edu">Zhiyun Qian</a> of UC Riverside: CVE-2015-8950</li> 134 <li>Hao Chen of Alpha Team, Qihoo 360 Technology Co. Ltd.: CVE-2016-3860</li> 135 <li>Jann Horn of Google Project Zero: CVE-2016-3900, CVE-2016-3885</li> 136 <li><a href="http://keybase.io/jasonrogena">Jason Rogena</a>: CVE-2016-3917</li> 137 <li>Jianqiang Zhao (<a href="https://twitter.com/jianqiangzhao">@jianqiangzhao</a>) and 138 <a href="http://weibo.com/jfpan">pjf</a> of IceSword Lab, Qihoo 360: CVE-2016-6688, 139 CVE-2016-6677, CVE-2016-6673, CVE-2016-6687, CVE-2016-6686, CVE-2016-6681, 140 CVE-2016-6682, CVE-2016-3930</li> 141 <li>Joshua Drake (<a href="https://twitter.com/jduck">@jduck</a>): 142 CVE-2016-3920</li> 143 <li>Maciej Szawowski of Google security team: CVE-2016-3905</li> 144 <li>Mark Brand of Google Project Zero: CVE-2016-6689</li> 145 <li><a href="https://github.com/michalbednarski">Micha Bednarski</a>: 146 CVE-2016-3914, CVE-2016-6674, CVE-2016-3911, CVE-2016-3912</li> 147 <li>Mingjian Zhou (<a href="https://twitter.com/Mingjian_Zhou">@Mingjian_Zhou</a>), 148 Chiachih Wu (<a href="https://twitter.com/chiachih_wu">@chiachih_wu</a>), and Xuxian 149 Jiang of <a href="http://c0reteam.org">C0RE Team</a>: CVE-2016-3933, CVE-2016-3932</li> 150 <li>Nightwatch Cybersecurity Research 151 (<a href="https://twitter.com/nightwatchcyber">@nightwatchcyber</a>): CVE-2016-5348</li> 152 <li>Roee Hay, IBM Security X-Force Researcher: CVE-2016-6678</li> 153 <li>Samuel Tan of Google: CVE-2016-3925</li> 154 <li><a href="mailto:sbauer (a] plzdonthack.me">Scott Bauer</a> 155 (<a href="https://twitter.com/ScottyBauer1">@ScottyBauer1</a>): 156 CVE-2016-3936, CVE-2016-3928, CVE-2016-3902, CVE-2016-3937, CVE-2016-6696</li> 157 <li>Seven Shen (<a href="https://twitter.com/lingtongshen">@lingtongshen</a>) of 158 Trend Micro Mobile Threat Research Team: CVE-2016-6685, CVE-2016-6683, 159 CVE-2016-6680, CVE-2016-6679, CVE-2016-3903, CVE-2016-6693, CVE-2016-6694, 160 CVE-2016-6695</li> 161 <li><a href="mailto:vancouverdou (a] gmail.com">Wenke Dou</a>, Mingjian Zhou 162 (<a href="https://twitter.com/Mingjian_Zhou">@Mingjian_Zhou</a>), Chiachih Wu 163 (<a href="https://twitter.com/chiachih_wu">@chiachih_wu</a>), and Xuxian Jiang of 164 <a href="http://c0reteam.org">C0RE Team</a>: CVE-2016-3909</li> 165 <li>Wenlin Yang and Guang Gong () (<a href="https://twitter.com/oldfresher">@oldfresher</a>) 166 of Alpha Team, Qihoo 360 Technology Co. Ltd.: CVE-2016-3918</li> 167 <li>Wish Wu (<a href="http://weibo.com/wishlinux"></a>) 168 (<a href="https://twitter.com/wish_wu">@wish_wu)</a> of 169 <a href="http://blog.trendmicro.com/trendlabs-security-intelligence/author/wishwu/">Trend 170 Micro Inc.</a>: CVE-2016-3924, CVE-2016-3915, CVE-2016-3916, CVE-2016-3910</li> 171 <li>Yong Shi of Eagleye team, SCC, Huawei: CVE-2016-3938</li> 172 <li>Zhanpeng Zhao () (<a href="https://twitter.com/0xr0ot">@0xr0ot</a>) of 173 Security Research Lab, <a href="http://www.cmcm.com">Cheetah Mobile</a>: 174 CVE-2016-3908</li> 175 </ul> 176 177 <h2 id="2016-10-01-details">2016-10-01 178 security patch levelVulnerability details</h2> 179 <p> 180 In the sections below, we provide details for each of the security 181 vulnerabilities that apply to the 2016-10-01 patch level. There is a description of 182 the issue, a severity rationale, and a table with the CVE, associated 183 references, severity, updated Nexus devices, updated AOSP versions (where 184 applicable), and date reported. When available, we will link the public change 185 that addressed the issue to the bug ID, like the AOSP change list. When multiple 186 changes relate to a single bug, additional references are linked to numbers 187 following the bug ID. 188 </p> 189 <h3 id="eopv-in-servicemanager">Elevation of privilege vulnerability in ServiceManager</h3> 190 <p> 191 An elevation of privilege in ServiceManager could enable a local malicious 192 application to register arbitrary services that would normally be provided by a 193 privileged process, such as the system_server. This issue is rated as High 194 severity due to the possibility of service impersonation. 195 </p> 196 <table> 197 <col width="18%"> 198 <col width="16%"> 199 <col width="10%"> 200 <col width="19%"> 201 <col width="19%"> 202 <col width="17%"> 203 <tr> 204 <th>CVE</th> 205 <th>References</th> 206 <th>Severity</th> 207 <th>Updated Nexus devices</th> 208 <th>Updated AOSP versions</th> 209 <th>Date reported</th> 210 </tr> 211 <tr> 212 <td>CVE-2016-3900</td> 213 <td><a href="https://android.googlesource.com/platform/frameworks/native/+/d3c6ce463ac91ecbeb2128beb475d31d3ca6ef42">A-29431260</a> 214 [<a href="https://android.googlesource.com/platform/frameworks/native/+/047eec456943dc082e33220d28abb7df4e089f69">2</a>] 215 </td> 216 <td>High</td> 217 <td>All Nexus</td> 218 <td>5.0.2, 5.1.1, 6.0, 6.0.1, 7.0</td> 219 <td>Jun 15, 2016</td> 220 </tr> 221 </table> 222 <h3 id="eopv-in-lock-settings-service">Elevation 223 of privilege vulnerability in Lock Settings Service</h3> 224 <p> 225 An elevation of privilege vulnerability in Lock Settings Service could enable a 226 local malicious application to clear the device PIN or password. This issue is 227 rated as High because it is a local bypass of user interaction requirements for 228 any developer or security settings modifications. 229 </p> 230 <table> 231 <col width="18%"> 232 <col width="16%"> 233 <col width="10%"> 234 <col width="19%"> 235 <col width="19%"> 236 <col width="17%"> 237 <tr> 238 <th>CVE</th> 239 <th>References</th> 240 <th>Severity</th> 241 <th>Updated Nexus devices</th> 242 <th>Updated AOSP versions</th> 243 <th>Date reported</th> 244 </tr> 245 <tr> 246 <td>CVE-2016-3908</td> 247 <td><a href="https://android.googlesource.com/platform/frameworks/base/+/96daf7d4893f614714761af2d53dfb93214a32e4">A-30003944</a> 248 </td> 249 <td>High</td> 250 <td>All Nexus</td> 251 <td>6.0, 6.0.1, 7.0</td> 252 <td>Jul 6, 2016</td> 253 </tr> 254 </table> 255 <h3 id="eopv-in-mediaserver">Elevation of privilege vulnerability in Mediaserver</h3> 256 <p> 257 An elevation of privilege vulnerability in Mediaserver could enable a local 258 malicious application to execute arbitrary code within the context of a 259 privileged process. This issue is rated as High because it could be used to gain 260 local access to elevated capabilities, which are not normally accessible to a 261 third-party application. 262 </p> 263 <table> 264 <col width="18%"> 265 <col width="16%"> 266 <col width="10%"> 267 <col width="19%"> 268 <col width="19%"> 269 <col width="17%"> 270 <tr> 271 <th>CVE</th> 272 <th>References</th> 273 <th>Severity</th> 274 <th>Updated Nexus devices</th> 275 <th>Updated AOSP versions</th> 276 <th>Date reported</th> 277 </tr> 278 <tr> 279 <td>CVE-2016-3909</td> 280 <td><a href="https://android.googlesource.com/platform/frameworks/av/+/d4271b792bdad85a80e2b83ab34c4b30b74f53ec">A-30033990</a> 281 [<a href="https://android.googlesource.com/platform/frameworks/av/+/c48ef757cc50906e8726a3bebc3b60716292cdba">2</a>] 282 </td> 283 <td>High</td> 284 <td>All Nexus</td> 285 <td>4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0</td> 286 <td>Jul 8, 2016</td> 287 </tr> 288 <tr> 289 <td>CVE-2016-3910</td> 290 <td><a href="https://android.googlesource.com/platform/frameworks/av/+/035cb12f392860113dce96116a5150e2fde6f0cc">A-30148546</a> 291 </td> 292 <td>High</td> 293 <td>All Nexus</td> 294 <td>5.0.2, 5.1.1, 6.0, 6.0.1, 7.0</td> 295 <td>Jul 13, 2016</td> 296 </tr> 297 <tr> 298 <td>CVE-2016-3913</td> 299 <td><a href="https://android.googlesource.com/platform/frameworks/av/+/0c3b93c8c2027e74af642967eee5c142c8fd185d">A-30204103</a> 300 </td> 301 <td>High</td> 302 <td>All Nexus</td> 303 <td>4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0</td> 304 <td>Jul 18, 2016</td> 305 </tr> 306 </table> 307 <h3 id="eopv-in-zygote-process">Elevation of privilege vulnerability in Zygote process</h3> 308 <p> 309 An elevation of privilege in the Zygote process could enable a local malicious 310 application to execute arbitrary code within the context of a privileged 311 process. This issue is rated as High because it could be used to gain local 312 access to elevated capabilities, which are not normally accessible to a 313 third-party application. 314 </p> 315 <table> 316 <col width="18%"> 317 <col width="16%"> 318 <col width="10%"> 319 <col width="19%"> 320 <col width="19%"> 321 <col width="17%"> 322 <tr> 323 <th>CVE</th> 324 <th>References</th> 325 <th>Severity</th> 326 <th>Updated Nexus devices</th> 327 <th>Updated AOSP versions</th> 328 <th>Date reported</th> 329 </tr> 330 <tr> 331 <td>CVE-2016-3911</td> 332 <td><a href="https://android.googlesource.com/platform/frameworks/base/+/2c7008421cb67f5d89f16911bdbe36f6c35311ad">A-30143607</a> 333 </td> 334 <td>High</td> 335 <td>All Nexus</td> 336 <td>4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0</td> 337 <td>Jul 12, 2016</td> 338 </tr> 339 </table> 340 <h3 id="eopv-in-framework-apis">Elevation of privilege vulnerability in framework APIs</h3> 341 <p> 342 An elevation of privilege vulnerability in the framework APIs could enable a 343 local malicious application to execute arbitrary code within the context of a 344 privileged process. This issue is rated as High because it could be used to gain 345 local access to elevated capabilities, which are not normally accessible to a 346 third-party application. 347 </p> 348 <table> 349 <col width="18%"> 350 <col width="16%"> 351 <col width="10%"> 352 <col width="19%"> 353 <col width="19%"> 354 <col width="17%"> 355 <tr> 356 <th>CVE</th> 357 <th>References</th> 358 <th>Severity</th> 359 <th>Updated Nexus devices</th> 360 <th>Updated AOSP versions</th> 361 <th>Date reported</th> 362 </tr> 363 <tr> 364 <td>CVE-2016-3912</td> 365 <td><a href="https://android.googlesource.com/platform/frameworks/base/+/6c049120c2d749f0c0289d822ec7d0aa692f55c5">A-30202481</a> 366 </td> 367 <td>High</td> 368 <td>All Nexus</td> 369 <td>4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0</td> 370 <td>Jul 17, 2016</td> 371 </tr> 372 </table> 373 <h3 id="eopv-in-telephony">Elevation of privilege vulnerability in Telephony</h3> 374 <p> 375 An elevation of privilege vulnerability in the Telephony component could enable 376 a local malicious application to execute arbitrary code within the context of a 377 privileged process. This issue is rated as High because it could be used to gain 378 local access to elevated capabilities, which are not normally accessible to a 379 third-party application. 380 </p> 381 <table> 382 <col width="18%"> 383 <col width="16%"> 384 <col width="10%"> 385 <col width="19%"> 386 <col width="19%"> 387 <col width="17%"> 388 <tr> 389 <th>CVE</th> 390 <th>References</th> 391 <th>Severity</th> 392 <th>Updated Nexus devices</th> 393 <th>Updated AOSP versions</th> 394 <th>Date reported</th> 395 </tr> 396 <tr> 397 <td>CVE-2016-3914</td> 398 <td><a href="https://android.googlesource.com/platform/packages/providers/TelephonyProvider/+/3a3a5d145d380deef2d5b7c3150864cd04be397f">A-30481342</a> 399 </td> 400 <td>High</td> 401 <td>All Nexus</td> 402 <td>4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0</td> 403 <td>Jul 28, 2016</td> 404 </tr> 405 </table> 406 <h3 id="eopv-in-camera-service">Elevation of privilege vulnerability in Camera service</h3> 407 <p> 408 An elevation of privilege vulnerability in the Camera service could enable a 409 local malicious application to execute arbitrary code within the context of a 410 privileged process. This issue is rated as High because it could be used to gain 411 local access to elevated capabilities, which are not normally accessible to a 412 third-party application. 413 </p> 414 <table> 415 <col width="18%"> 416 <col width="16%"> 417 <col width="10%"> 418 <col width="19%"> 419 <col width="19%"> 420 <col width="17%"> 421 <tr> 422 <th>CVE</th> 423 <th>References</th> 424 <th>Severity</th> 425 <th>Updated Nexus devices</th> 426 <th>Updated AOSP versions</th> 427 <th>Date reported</th> 428 </tr> 429 <tr> 430 <td>CVE-2016-3915</td> 431 <td><a href="https://android.googlesource.com/platform/system/media/+/e9e44f797742f52996ebf307740dad58c28fd9b5">A-30591838</a> 432 </td> 433 <td>High</td> 434 <td>All Nexus</td> 435 <td>4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0</td> 436 <td>Aug 1, 2016</td> 437 </tr> 438 <tr> 439 <td>CVE-2016-3916</td> 440 <td><a href="https://android.googlesource.com/platform/system/media/+/8e7a2b4d13bff03973dbad2bfb88a04296140433">A-30741779</a> 441 </td> 442 <td>High</td> 443 <td>All Nexus</td> 444 <td>4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0</td> 445 <td>Aug 2, 2016</td> 446 </tr> 447 </table> 448 <h3 id="eopv-in-fingerprint-login">Elevation of privilege vulnerability in fingerprint login</h3> 449 <p> 450 An elevation of privilege vulnerability during fingerprint login could enable a 451 malicious device owner to login as a different user account on the device. This 452 issue is rated as High due to the possibility of a lockscreen bypass. 453 </p> 454 <table> 455 <col width="18%"> 456 <col width="16%"> 457 <col width="10%"> 458 <col width="19%"> 459 <col width="19%"> 460 <col width="17%"> 461 <tr> 462 <th>CVE</th> 463 <th>References</th> 464 <th>Severity</th> 465 <th>Updated Nexus devices</th> 466 <th>Updated AOSP versions</th> 467 <th>Date reported</th> 468 </tr> 469 <tr> 470 <td>CVE-2016-3917</td> 471 <td><a href="https://android.googlesource.com/platform/frameworks/base/+/f5334952131afa835dd3f08601fb3bced7b781cd">A-30744668</a> 472 </td> 473 <td>High</td> 474 <td>All Nexus</td> 475 <td>6.0.1, 7.0</td> 476 <td>Aug 5, 2016</td> 477 </tr> 478 </table> 479 <h3 id="information-disclosure-vulnerability-in-aosp-mail">Information 480 disclosure vulnerability in AOSP Mail</h3> 481 <p> 482 An information disclosure vulnerability in AOSP Mail could enable a local 483 malicious application to bypass operating system protections that isolate 484 application data from other applications. This issue is rated as High because it 485 could be used to access data without permission. 486 </p> 487 <table> 488 <col width="18%"> 489 <col width="16%"> 490 <col width="10%"> 491 <col width="19%"> 492 <col width="19%"> 493 <col width="17%"> 494 <tr> 495 <th>CVE</th> 496 <th>References</th> 497 <th>Severity</th> 498 <th>Updated Nexus devices</th> 499 <th>Updated AOSP versions</th> 500 <th>Date reported</th> 501 </tr> 502 <tr> 503 <td>CVE-2016-3918</td> 504 <td><a href="https://android.googlesource.com/platform/packages/apps/Email/+/6b2b0bd7c771c698f11d7be89c2c57c8722c7454">A-30745403</a> 505 </td> 506 <td>High</td> 507 <td>All Nexus</td> 508 <td>4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0</td> 509 <td>Aug 5, 2016</td> 510 </tr> 511 </table> 512 <h3 id="dosv-in-wi-fi">Denial of service 513 vulnerability in Wi-Fi</h3> 514 <p> 515 A denial of service vulnerability in Wi-Fi could enable a local proximate 516 attacker to create a hotspot and cause a device reboot. This issue is rated as 517 High due to the possibility of a temporary remote denial of service. 518 </p> 519 <table> 520 <col width="18%"> 521 <col width="16%"> 522 <col width="10%"> 523 <col width="19%"> 524 <col width="17%"> 525 <col width="19%"> 526 <tr> 527 <th>CVE</th> 528 <th>References</th> 529 <th>Severity</th> 530 <th>Updated Nexus devices</th> 531 <th>Updated AOSP versions</th> 532 <th>Date reported</th> 533 </tr> 534 <tr> 535 <td>CVE-2016-3882</td> 536 <td><a href="https://android.googlesource.com/platform/frameworks/opt/net/wifi/+/35a86eef3c0eef760f7e61c52a343327ba601630">A-29464811</a> 537 </td> 538 <td>High</td> 539 <td>All Nexus</td> 540 <td>6.0, 6.0.1, 7.0</td> 541 <td>Jun 17, 2016</td> 542 </tr> 543 </table> 544 <h3 id="dosv-in-gps">Denial of service vulnerability in GPS</h3> 545 <p> 546 A denial of service vulnerability in the GPS component could enable a remote 547 attacker to cause a device hang or reboot. This issue is rated as High due to 548 the possibility of a temporary remote denial of service. 549 </p> 550 <table> 551 <col width="18%"> 552 <col width="16%"> 553 <col width="10%"> 554 <col width="19%"> 555 <col width="19%"> 556 <col width="17%"> 557 <tr> 558 <th>CVE</th> 559 <th>References</th> 560 <th>Severity</th> 561 <th>Updated Nexus devices</th> 562 <th>Updated AOSP versions</th> 563 <th>Date reported</th> 564 </tr> 565 <tr> 566 <td>CVE-2016-5348</td> 567 <td><a href="https://android.googlesource.com/platform/frameworks/base/+/218b813d5bc2d7d3952ea1861c38b4aa944ac59b">A-29555864</a> 568 </td> 569 <td>High</td> 570 <td>All Nexus</td> 571 <td>4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0</td> 572 <td>Jun 20, 2016</td> 573 </tr> 574 </table> 575 <h3 id="dosv-in-mediaserver">Denial of service vulnerability in Mediaserver</h3> 576 <p> 577 A denial of service vulnerability in Mediaserver could enable an attacker to use 578 a specially crafted file to cause a device hang or reboot. This issue is rated 579 as High due to the possibility of remote denial of service. 580 </p> 581 <table> 582 <col width="18%"> 583 <col width="16%"> 584 <col width="10%"> 585 <col width="19%"> 586 <col width="19%"> 587 <col width="17%"> 588 <tr> 589 <th>CVE</th> 590 <th>References</th> 591 <th>Severity</th> 592 <th>Updated Nexus devices</th> 593 <th>Updated AOSP versions</th> 594 <th>Date reported</th> 595 </tr> 596 <tr> 597 <td>CVE-2016-3920</td> 598 <td><a href="https://android.googlesource.com/platform/frameworks/av/+/6d0249be2275fd4086783f259f4e2c54722a7c55">A-30744884</a> 599 </td> 600 <td>High</td> 601 <td>All Nexus</td> 602 <td>5.0.2, 5.1.1, 6.0, 6.0.1, 7.0</td> 603 <td>Aug 5, 2016</td> 604 </tr> 605 </table> 606 <h3 id="eopv-in-framework-listener">Elevation of privilege vulnerability in Framework Listener</h3> 607 <p> 608 An elevation of privilege vulnerability in Framework Listener could enable a 609 local malicious application to execute arbitrary code within the context of a 610 privileged process. This issue is rated as Moderate because it first requires 611 compromising a privileged process. 612 </p> 613 <table> 614 <col width="18%"> 615 <col width="16%"> 616 <col width="10%"> 617 <col width="18%"> 618 <col width="20%"> 619 <col width="17%"> 620 <tr> 621 <th>CVE</th> 622 <th>References</th> 623 <th>Severity</th> 624 <th>Updated Nexus devices</th> 625 <th>Updated AOSP versions</th> 626 <th>Date reported</th> 627 </tr> 628 <tr> 629 <td>CVE-2016-3921</td> 630 <td><a href="https://android.googlesource.com/platform/system/core/+/771ab014c24a682b32990da08e87e2f0ab765bd2">A-29831647</a> 631 </td> 632 <td>Moderate</td> 633 <td>All Nexus</td> 634 <td>4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0</td> 635 <td>Jun 25, 2016</td> 636 </tr> 637 </table> 638 <h3 id="eopv-in-telephony-2">Elevation of privilege vulnerability in Telephony</h3> 639 <p> 640 An elevation of privilege vulnerability in Telephony could enable a local 641 malicious application to execute arbitrary code in the context of a privileged 642 process. This issue is rated as Moderate because it first requires compromising 643 a privileged process. 644 </p> 645 <table> 646 <col width="18%"> 647 <col width="16%"> 648 <col width="10%"> 649 <col width="19%"> 650 <col width="19%"> 651 <col width="17%"> 652 <tr> 653 <th>CVE</th> 654 <th>References</th> 655 <th>Severity</th> 656 <th>Updated Nexus devices</th> 657 <th>Updated AOSP versions</th> 658 <th>Date reported</th> 659 </tr> 660 <tr> 661 <td>CVE-2016-3922</td> 662 <td><a href="https://android.googlesource.com/platform/hardware/ril/+/95610818918f6f11fe7d23aca1380e6c0fac2af0">A-30202619</a> 663 </td> 664 <td>Moderate</td> 665 <td>All Nexus</td> 666 <td>6.0, 6.0.1, 7.0</td> 667 <td>Jul 17, 2016</td> 668 </tr> 669 </table> 670 <h3 671 id="eopv-in-accessibility-services">Elevation of privilege vulnerability in Accessibility services</h3> 672 <p> 673 An elevation of privilege vulnerability in the Accessibility services could 674 enable a local malicious application to generate unexpected touch events on the 675 device that could lead to applications accepting permission dialogs without the 676 users explicit consent. This issue is rated as Moderate because it is a local 677 bypass of user interaction requirements that would normally require either user 678 initiation or user permission. 679 </p> 680 <table> 681 <col width="18%"> 682 <col width="16%"> 683 <col width="10%"> 684 <col width="19%"> 685 <col width="18%"> 686 <col width="18%"> 687 <tr> 688 <th>CVE</th> 689 <th>References</th> 690 <th>Severity</th> 691 <th>Updated Nexus devices</th> 692 <th>Updated AOSP versions</th> 693 <th>Date reported</th> 694 </tr> 695 <tr> 696 <td>CVE-2016-3923</td> 697 <td><a href="https://android.googlesource.com/platform/frameworks/base/+/5f256310187b4ff2f13a7abb9afed9126facd7bc">A-30647115</a> 698 </td> 699 <td>Moderate</td> 700 <td>All Nexus</td> 701 <td>7.0</td> 702 <td>Google internal</td> 703 </tr> 704 </table> 705 <h3 id="information-disclosure-vulnerability-in-mediaserver">Information 706 disclosure vulnerability in Mediaserver</h3> 707 <p> 708 An information disclosure vulnerability in Mediaserver could enable a local 709 malicious application to access data outside of its permission levels. This 710 issue is rated as Moderate because it could be used to access sensitive data 711 without permission. 712 </p> 713 <table> 714 <col width="18%"> 715 <col width="16%"> 716 <col width="10%"> 717 <col width="18%"> 718 <col width="20%"> 719 <col width="17%"> 720 <tr> 721 <th>CVE</th> 722 <th>References</th> 723 <th>Severity</th> 724 <th>Updated Nexus devices</th> 725 <th>Updated AOSP versions</th> 726 <th>Date reported</th> 727 </tr> 728 <tr> 729 <td>CVE-2016-3924</td> 730 <td><a href="https://android.googlesource.com/platform/frameworks/av/+/c894aa36be535886a8e5ff02cdbcd07dd24618f6">A-30204301</a> 731 </td> 732 <td>Moderate</td> 733 <td>All Nexus</td> 734 <td>4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0</td> 735 <td>Jul 18, 2016</td> 736 </tr> 737 </table> 738 <h3 id="dosv-in-wi-fi-2">Denial of service vulnerability in Wi-Fi</h3> 739 <p> 740 A denial of service vulnerability in the Wi-Fi service could enable a local 741 malicious application to prevent Wi-Fi calling. This issue is rated as Moderate 742 due to the possibility of a denial of service to application functionality. 743 </p> 744 <table> 745 <col width="18%"> 746 <col width="16%"> 747 <col width="10%"> 748 <col width="19%"> 749 <col width="17%"> 750 <col width="19%"> 751 <tr> 752 <th>CVE</th> 753 <th>References</th> 754 <th>Severity</th> 755 <th>Updated Nexus devices</th> 756 <th>Updated AOSP versions</th> 757 <th>Date reported</th> 758 </tr> 759 <tr> 760 <td>CVE-2016-3925</td> 761 <td><a href="https://android.googlesource.com/platform/frameworks/opt/net/wifi/+/c2905409c20c8692d4396b8531b09e7ec81fa3fb">A-30230534</a> 762 </td> 763 <td>Moderate</td> 764 <td>All Nexus</td> 765 <td>6.0, 6.0.1, 7.0</td> 766 <td>Google internal</td> 767 </tr> 768 </table> 769 <h2 id="2016-10-05-details">2016-10-05 770 security patch levelVulnerability details</h2> 771 <p> 772 In the sections below, we provide details for each of the security 773 vulnerabilities that apply to the 2016-10-05 patch level. There is a description of 774 the issue, a severity rationale, and a table with the CVE, associated 775 references, severity, updated Nexus devices, updated AOSP versions (where 776 applicable), and date reported. When available, we will link the public change 777 that addressed the issue to the bug ID, like the AOSP change list. When multiple 778 changes relate to a single bug, additional references are linked to numbers 779 following the bug ID. 780 </p> 781 <h3 id="remote-code-execution-vulnerability-in-kernel-asn-1-decoder">Remote code 782 execution vulnerability in kernel ASN.1 decoder</h3> 783 <p> 784 An elevation of privilege vulnerability in the kernel ASN.1 decoder could enable 785 a local malicious application to execute arbitrary code within the context of 786 the kernel. This issue is rated as Critical due to the possibility of a local 787 permanent device compromise, which may require reflashing the operating system 788 to repair the device. 789 </p> 790 <table> 791 <col width="19%"> 792 <col width="20%"> 793 <col width="10%"> 794 <col width="23%"> 795 <col width="17%"> 796 <tr> 797 <th>CVE</th> 798 <th>References</th> 799 <th>Severity</th> 800 <th>Updated Nexus devices</th> 801 <th>Date reported</th> 802 </tr> 803 <tr> 804 <td>CVE-2016-0758</td> 805 <td>A-29814470<br> 806 <a href="http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=23c8a812dc3c621009e4f0e5342aa4e2ede1ceaa"> 807 Upstream kernel</a></td> 808 <td>Critical</td> 809 <td>Nexus 5X, Nexus 6P</td> 810 <td>May 12, 2016</td> 811 </tr> 812 </table> 813 <h3 814 id="remote-code-execution-vulnerability-in-kernel-networking-subsystem">Remote 815 code execution vulnerability in kernel networking subsystem</h3> 816 <p> 817 A remote code execution vulnerability in the kernel networking subsystem could 818 enable a remote attacker to execute arbitrary code within the context of the 819 kernel. This issue is rated as Critical due to the possibility of a local 820 permanent device compromise, which may require reflashing the operating system 821 to repair the device. 822 </p> 823 <table> 824 <col width="19%"> 825 <col width="20%"> 826 <col width="10%"> 827 <col width="23%"> 828 <col width="17%"> 829 <tr> 830 <th>CVE</th> 831 <th>References</th> 832 <th>Severity</th> 833 <th>Updated Nexus devices</th> 834 <th>Date reported</th> 835 </tr> 836 <tr> 837 <td>CVE-2016-7117</td> 838 <td>A-30515201<br> 839 <a href="http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=34b88a68f26a75e4fded796f1a49c40f82234b7d">Upstream 840 kernel</a></td> 841 <td>Critical</td> 842 <td>All Nexus</td> 843 <td>Google internal</td> 844 </tr> 845 </table> 846 <h3 id="eopv-in-mediatek-video-driver">Elevation 847 of privilege vulnerability in MediaTek video driver</h3> 848 <p> 849 An elevation of privilege vulnerability in the MediaTek video driver could 850 enable a local malicious application to execute arbitrary code within the 851 context of the kernel. This issue is rated as Critical due to the possibility of 852 a local permanent device compromise, which may require reflashing the operating 853 system to repair the device. 854 </p> 855 <table> 856 <col width="19%"> 857 <col width="20%"> 858 <col width="10%"> 859 <col width="23%"> 860 <col width="17%"> 861 <tr> 862 <th>CVE</th> 863 <th>References</th> 864 <th>Severity</th> 865 <th>Updated Nexus devices</th> 866 <th>Date reported</th> 867 </tr> 868 <tr> 869 <td>CVE-2016-3928</td> 870 <td>A-30019362*<br> 871 M-ALPS02829384</td> 872 <td>Critical</td> 873 <td>None</td> 874 <td>Jul 6, 2016</td> 875 </tr> 876 </table> 877 <p> 878 * The patch for this issue is not publicly available. The update is contained in 879 the latest binary drivers for Nexus devices available from the 880 <a href="https://developers.google.com/android/nexus/drivers">Google Developer 881 site</a>. 882 </p> 883 <h3 884 id="eopv-in-kernel-shared-memory-driver">Elevation 885 of privilege vulnerability in kernel shared memory driver</h3> 886 <p> 887 An elevation of privilege vulnerability in the kernel shared memory driver could 888 enable a local malicious application to execute arbitrary code within the 889 context of the kernel. This issue is rated as Critical due to the possibility of 890 a local permanent device compromise, which may require reflashing the operating 891 system to repair the device. 892 </p> 893 <table> 894 <col width="19%"> 895 <col width="20%"> 896 <col width="10%"> 897 <col width="23%"> 898 <col width="17%"> 899 <tr> 900 <th>CVE</th> 901 <th>References</th> 902 <th>Severity</th> 903 <th>Updated Nexus devices</th> 904 <th>Date reported</th> 905 </tr> 906 <tr> 907 <td>CVE-2016-5340</td> 908 <td>A-30652312<br> 909 <a href="https://source.codeaurora.org/quic/la//kernel/msm-3.10/commit/?id=06e51489061e5473b4e2035c79dcf7c27a6f75a6">QC-CR#1008948</a></td> 910 <td>Critical</td> 911 <td>Nexus 5, Nexus 5X, Nexus 6, Nexus 6P, Android One</td> 912 <td>Jul 26, 2016</td> 913 </tr> 914 </table> 915 916 <h3 id="vulnerabilities-in-qc-components"> 917 Vulnerabilities in Qualcomm components</h3> 918 <p> 919 The table below contains security vulnerabilities affecting Qualcomm components 920 and are described in further detail in the Qualcomm AMSS March 2016 and 921 Qualcomm AMSS April 2016 security bulletins. 922 </p> 923 <table> 924 <col width="19%"> 925 <col width="16%"> 926 <col width="10%"> 927 <col width="23%"> 928 <col width="21%"> 929 <tr> 930 <th>CVE</th> 931 <th>References</th> 932 <th>Severity</th> 933 <th>Updated Nexus devices</th> 934 <th>Date reported</th> 935 </tr> 936 <tr> 937 <td>CVE-2016-3926</td> 938 <td>A-28823953*</td> 939 <td>Critical</td> 940 <td>Nexus 5, Nexus 5X, Nexus 6, Nexus 6P</td> 941 <td>Qualcomm internal</td> 942 </tr> 943 <tr> 944 <td>CVE-2016-3927</td> 945 <td>A-28823244*</td> 946 <td>Critical</td> 947 <td>Nexus 5X, Nexus 6P</td> 948 <td>Qualcomm internal</td> 949 </tr> 950 <tr> 951 <td>CVE-2016-3929</td> 952 <td>A-28823675*</td> 953 <td>High</td> 954 <td>Nexus 5X, Nexus 6P</td> 955 <td>Qualcomm internal</td> 956 </tr> 957 </table> 958 <p> 959 * The patch for this issue is not publicly available. The update is contained in 960 the latest binary drivers for Nexus devices available from the 961 <a href="https://developers.google.com/android/nexus/drivers">Google Developer 962 site</a>. 963 </p> 964 <h3 id="eopv-in-qualcomm-networking-component">Elevation 965 of privilege vulnerability in Qualcomm networking component</h3> 966 <p> 967 An elevation of privilege vulnerability in the Qualcomm networking component 968 could enable a local malicious application to execute arbitrary code within the 969 context of the kernel. This issue is rated as High because it first requires 970 compromising a privileged process. 971 </p> 972 <table> 973 <col width="19%"> 974 <col width="20%"> 975 <col width="10%"> 976 <col width="23%"> 977 <col width="17%"> 978 <tr> 979 <th>CVE</th> 980 <th>References</th> 981 <th>Severity</th> 982 <th>Updated Nexus devices</th> 983 <th>Date reported</th> 984 </tr> 985 <tr> 986 <td>CVE-2016-2059</td> 987 <td>A-27045580<br> 988 <a href="https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=9e8bdd63f7011dff5523ea435433834b3702398d">QC-CR#974577</a></td> 989 <td>High</td> 990 <td>Nexus 5, Nexus 5X, Nexus 6, Nexus 6P, Android One</td> 991 <td>Feb 4, 2016</td> 992 </tr> 993 </table> 994 <h3 id="eopv-in-nvidia-mmc-test-driver">Elevation of privilege vulnerability in 995 NVIDIA MMC test driver</h3> 996 <p> 997 An elevation of privilege vulnerability in the NVIDIA MMC test driver could 998 enable a local malicious application to execute arbitrary code within the 999 context of the kernel. This issue is rated as High because it first requires 1000 compromising a privileged process. 1001 </p> 1002 <table> 1003 <col width="19%"> 1004 <col width="20%"> 1005 <col width="10%"> 1006 <col width="23%"> 1007 <col width="17%"> 1008 <tr> 1009 <th>CVE</th> 1010 <th>References</th> 1011 <th>Severity</th> 1012 <th>Updated Nexus devices</th> 1013 <th>Date reported</th> 1014 </tr> 1015 <tr> 1016 <td>CVE-2016-3930</td> 1017 <td>A-28760138*<br> 1018 N-CVE-2016-3930</td> 1019 <td>High</td> 1020 <td>Nexus 9</td> 1021 <td>May 12, 2016</td> 1022 </tr> 1023 </table> 1024 <p> 1025 * The patch for this issue is not publicly available. The update is contained in 1026 the latest binary drivers for Nexus devices available from the 1027 <a href="https://developers.google.com/android/nexus/drivers">Google Developer 1028 site</a>. 1029 </p> 1030 <h3 1031 id="eopv-in-qsee-communicator-driver">Elevation of privilege vulnerability in 1032 Qualcomm QSEE Communicator driver</h3> 1033 <p> 1034 An elevation of privilege vulnerability in the Qualcomm QSEE 1035 Communicator driver could enable a local malicious application to 1036 execute arbitrary code within the context of the kernel. This issue is rated as 1037 High because it first requires compromising a privileged process. 1038 </p> 1039 <table> 1040 <col width="19%"> 1041 <col width="20%"> 1042 <col width="10%"> 1043 <col width="23%"> 1044 <col width="17%"> 1045 <tr> 1046 <th>CVE</th> 1047 <th>References</th> 1048 <th>Severity</th> 1049 <th>Updated Nexus devices</th> 1050 <th>Date reported</th> 1051 </tr> 1052 <tr> 1053 <td>CVE-2016-3931</td> 1054 <td>A-29157595<br> 1055 <a href="https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=e80b88323f9ff0bb0e545f209eec08ec56fca816">QC-CR#1036418</a></td> 1056 <td>High</td> 1057 <td>Nexus 5X, Nexus 6, Nexus 6P, Android One</td> 1058 <td>Jun 4, 2016</td> 1059 </tr> 1060 </table> 1061 <h3 id="eopv-in-mediaserver-2">Elevation of privilege vulnerability in Mediaserver</h3> 1062 <p> 1063 An elevation of privilege vulnerability in Mediaserver could enable a local 1064 malicious application to execute arbitrary code within the context of a 1065 privileged process. This issue is rated as High because it could be used to gain 1066 local access to elevated capabilities, which are not normally accessible to a 1067 third-party application. 1068 </p> 1069 <table> 1070 <col width="19%"> 1071 <col width="20%"> 1072 <col width="10%"> 1073 <col width="23%"> 1074 <col width="17%"> 1075 <tr> 1076 <th>CVE</th> 1077 <th>References</th> 1078 <th>Severity</th> 1079 <th>Updated Nexus devices</th> 1080 <th>Date reported</th> 1081 </tr> 1082 <tr> 1083 <td>CVE-2016-3932</td> 1084 <td>A-29161895<br> 1085 M-ALPS02770870</td> 1086 <td>High</td> 1087 <td>None</td> 1088 <td>Jun 6, 2016</td> 1089 </tr> 1090 <tr> 1091 <td>CVE-2016-3933</td> 1092 <td>A-29421408*<br> 1093 N-CVE-2016-3933</td> 1094 <td>High</td> 1095 <td>Nexus 9, Pixel C</td> 1096 <td>Jun 14, 2016</td> 1097 </tr> 1098 </table> 1099 <p> 1100 * The patch for this issue is not publicly available. The update is contained in 1101 the latest binary drivers for Nexus devices available from the 1102 <a href="https://developers.google.com/android/nexus/drivers">Google Developer 1103 site</a>. 1104 </p> 1105 <h3 id="eopv-in-qualcomm-camera-driver">Elevation of privilege vulnerability 1106 in Qualcomm camera driver</h3> 1107 <p> 1108 An elevation of privilege vulnerability in the Qualcomm camera driver could 1109 enable a local malicious application to execute arbitrary code within the 1110 context of the kernel. This issue is rated as High because it first requires 1111 compromising a privileged process. 1112 </p> 1113 <table> 1114 <col width="19%"> 1115 <col width="20%"> 1116 <col width="10%"> 1117 <col width="23%"> 1118 <col width="17%"> 1119 <tr> 1120 <th>CVE</th> 1121 <th>References</th> 1122 <th>Severity</th> 1123 <th>Updated Nexus devices</th> 1124 <th>Date reported</th> 1125 </tr> 1126 <tr> 1127 <td>CVE-2016-3903</td> 1128 <td>A-29513227<br> 1129 <a href="https://source.codeaurora.org/quic/la/kernel/msm-3.10/commit/?id=b8874573428e8ce024f57c6242d662fcca5e5d55">QC-CR#1040857</a></td> 1130 <td>High</td> 1131 <td>Nexus 5, Nexus 5X, Nexus 6, Nexus 6P, Android One</td> 1132 <td>Jun 20, 2016</td> 1133 </tr> 1134 <tr> 1135 <td>CVE-2016-3934</td> 1136 <td>A-30102557<br> 1137 <a href="https://source.codeaurora.org/quic/la/kernel/msm-3.10/commit/?id=27fbeb6b025d5d46ccb0497cbed4c6e78ed1c5cc">QC-CR#789704</a></td> 1138 <td>High</td> 1139 <td>Nexus 5, Nexus 5X, Nexus 6, Nexus 6P, Android One</td> 1140 <td>Jul 12, 2016</td> 1141 </tr> 1142 </table> 1143 <h3 id="eopv-in-qualcomm-sound-driver">Elevation 1144 of privilege vulnerability in Qualcomm sound driver</h3> 1145 <p> 1146 An elevation of privilege vulnerability in the Qualcomm sound driver could 1147 enable a local malicious application to execute arbitrary code within the 1148 context of the kernel. This issue is rated as High because it first requires 1149 compromising a privileged process. 1150 </p> 1151 <table> 1152 <col width="19%"> 1153 <col width="20%"> 1154 <col width="10%"> 1155 <col width="23%"> 1156 <col width="17%"> 1157 <tr> 1158 <th>CVE</th> 1159 <th>References</th> 1160 <th>Severity</th> 1161 <th>Updated Nexus devices</th> 1162 <th>Date reported</th> 1163 </tr> 1164 <tr> 1165 <td>CVE-2015-8951</td> 1166 <td>A-30142668<br> 1167 <a href="https://source.codeaurora.org/quic/la/kernel/msm-3.10/commit/?h=APSS.FSM.3.0&id=ccff36b07bfc49efc77b9f1b55ed2bf0900b1d5b">QC-CR#948902</a><br> 1168 QC-CR#948902</td> 1169 <td>High</td> 1170 <td>Nexus 5X, Nexus 6P, Android One</td> 1171 <td>Jun 20, 2016</td> 1172 </tr> 1173 </table> 1174 <h3 id="eopv-in-qualcomm-crypto-engine-driver">Elevation 1175 of privilege vulnerability in Qualcomm crypto engine driver</h3> 1176 <p> 1177 An elevation of privilege vulnerability in the Qualcomm cryptographic engine 1178 driver could enable a local malicious application to execute arbitrary code 1179 within the context of the kernel. This issue is rated as High because it first 1180 requires compromising a privileged process. 1181 </p> 1182 <table> 1183 <col width="19%"> 1184 <col width="20%"> 1185 <col width="10%"> 1186 <col width="23%"> 1187 <col width="17%"> 1188 <tr> 1189 <th>CVE</th> 1190 <th>References</th> 1191 <th>Severity</th> 1192 <th>Updated Nexus devices</th> 1193 <th>Date reported</th> 1194 </tr> 1195 <tr> 1196 <td>CVE-2016-3901</td> 1197 <td>A-29999161<br> 1198 <a href="https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=5f69ccf3b011c1d14a1b1b00dbaacf74307c9132">QC-CR#1046434</a></td> 1199 <td>High</td> 1200 <td>Nexus 5X, Nexus 6, Nexus 6P, Android One</td> 1201 <td>Jul 6, 2016</td> 1202 </tr> 1203 <tr> 1204 <td>CVE-2016-3935</td> 1205 <td>A-29999665<br> 1206 <a href="https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=5f69ccf3b011c1d14a1b1b00dbaacf74307c9132">QC-CR#1046507</a></td> 1207 <td>High</td> 1208 <td>Nexus 5X, Nexus 6, Nexus 6P, Android One</td> 1209 <td>Jul 6, 2016</td> 1210 </tr> 1211 </table> 1212 <h3 id="eopv-in-mediatek-video-driver-2">Elevation 1213 of privilege vulnerability in MediaTek video driver</h3> 1214 <p> 1215 An elevation of privilege vulnerability in the MediaTek video driver could 1216 enable a local malicious application to execute arbitrary code within the 1217 context of the kernel. This issue is rated as High because it first requires 1218 compromising a privileged process. 1219 </p> 1220 <table> 1221 <col width="19%"> 1222 <col width="20%"> 1223 <col width="10%"> 1224 <col width="23%"> 1225 <col width="17%"> 1226 <tr> 1227 <th>CVE</th> 1228 <th>References</th> 1229 <th>Severity</th> 1230 <th>Updated Nexus devices</th> 1231 <th>Date reported</th> 1232 </tr> 1233 <tr> 1234 <td>CVE-2016-3936</td> 1235 <td>A-30019037*<br> 1236 M-ALPS02829568</td> 1237 <td>High</td> 1238 <td>None</td> 1239 <td>Jul 6, 2016</td> 1240 </tr> 1241 <tr> 1242 <td>CVE-2016-3937</td> 1243 <td>A-30030994*<br> 1244 M-ALPS02834874</td> 1245 <td>High</td> 1246 <td>None</td> 1247 <td>Jul 7, 2016</td> 1248 </tr> 1249 </table> 1250 <p> 1251 * The patch for this issue is not publicly available. The update is contained in 1252 the latest binary drivers for Nexus devices available from the 1253 <a href="https://developers.google.com/android/nexus/drivers">Google Developer 1254 site</a>. 1255 </p> 1256 <h3 id="eopv-in-qualcomm-video-driver">Elevation 1257 of privilege vulnerability in Qualcomm video driver</h3> 1258 <p> 1259 An elevation of privilege vulnerability in the Qualcomm video driver could 1260 enable a local malicious application to execute arbitrary code within the 1261 context of the kernel. This issue is rated as High because it first requires 1262 compromising a privileged process. 1263 </p> 1264 <table> 1265 <col width="19%"> 1266 <col width="20%"> 1267 <col width="10%"> 1268 <col width="23%"> 1269 <col width="17%"> 1270 <tr> 1271 <th>CVE</th> 1272 <th>References</th> 1273 <th>Severity</th> 1274 <th>Updated Nexus devices</th> 1275 <th>Date reported</th> 1276 </tr> 1277 <tr> 1278 <td>CVE-2016-3938</td> 1279 <td>A-30019716<br> 1280 <a href="https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=467c81f9736b1ebc8d4ba70f9221bba02425ca10">QC-CR#1049232</a></td> 1281 <td>High</td> 1282 <td>Nexus 5X, Nexus 6, Nexus 6P, Android One</td> 1283 <td>Jul 7, 2016</td> 1284 </tr> 1285 <tr> 1286 <td>CVE-2016-3939</td> 1287 <td>A-30874196<br> 1288 <a href="https://source.codeaurora.org/quic/la//kernel/msm-3.18/commit/?id=e0bb18771d6ca71db2c2a61226827059be3fa424">QC-CR#1001224</a></td> 1289 <td>High</td> 1290 <td>Nexus 5X, Nexus 6, Nexus 6P, Android One</td> 1291 <td>Aug 15, 2016</td> 1292 </tr> 1293 </table> 1294 <h3 1295 id="eopv-in-synaptics-touchscreen-driver">Elevation 1296 of privilege vulnerability in Synaptics touchscreen driver</h3> 1297 <p> 1298 An elevation of privilege vulnerability in the Synaptics touchscreen driver 1299 could enable a local malicious application to execute arbitrary code within the 1300 context of the kernel. This issue is rated as High because it first requires 1301 compromising a privileged process. 1302 </p> 1303 <table> 1304 <col width="19%"> 1305 <col width="20%"> 1306 <col width="10%"> 1307 <col width="23%"> 1308 <col width="17%"> 1309 <tr> 1310 <th>CVE</th> 1311 <th>References</th> 1312 <th>Severity</th> 1313 <th>Updated Nexus devices</th> 1314 <th>Date reported</th> 1315 </tr> 1316 <tr> 1317 <td>CVE-2016-3940</td> 1318 <td>A-30141991*</td> 1319 <td>High</td> 1320 <td>Nexus 6P, Android One</td> 1321 <td>Jul 12, 2016</td> 1322 </tr> 1323 <tr> 1324 <td>CVE-2016-6672</td> 1325 <td>A-30537088*</td> 1326 <td>High</td> 1327 <td>Nexus 5X</td> 1328 <td>Jul 31, 2016</td> 1329 </tr> 1330 </table> 1331 <p> 1332 * The patch for this issue is not publicly available. The update is contained in 1333 the latest binary drivers for Nexus devices available from the 1334 <a href="https://developers.google.com/android/nexus/drivers">Google Developer 1335 site</a>. 1336 </p> 1337 <h3 id="eopv-in-nvidia-camera-driver">Elevation 1338 of privilege vulnerability in NVIDIA camera driver</h3> 1339 <p> 1340 An elevation of privilege vulnerability in the NVIDIA camera driver could enable 1341 a local malicious application to execute arbitrary code within the context of 1342 the kernel. This issue is rated as High because it first requires compromising a 1343 privileged process. 1344 </p> 1345 <table> 1346 <col width="19%"> 1347 <col width="20%"> 1348 <col width="10%"> 1349 <col width="23%"> 1350 <col width="17%"> 1351 <tr> 1352 <th>CVE</th> 1353 <th>References</th> 1354 <th>Severity</th> 1355 <th>Updated Nexus devices</th> 1356 <th>Date reported</th> 1357 </tr> 1358 <tr> 1359 <td>CVE-2016-6673</td> 1360 <td>A-30204201*<br> 1361 N-CVE-2016-6673</td> 1362 <td>High</td> 1363 <td>Nexus 9</td> 1364 <td>Jul 17, 2016</td> 1365 </tr> 1366 </table> 1367 <p> 1368 * The patch for this issue is not publicly available. The update is contained in 1369 the latest binary drivers for Nexus devices available from the 1370 <a href="https://developers.google.com/android/nexus/drivers">Google Developer 1371 site</a>. 1372 </p> 1373 <h3 id="eopv-in-system_server">Elevation of privilege vulnerability in system_server</h3> 1374 <p> 1375 An elevation of privilege vulnerability in system_server could enable a local 1376 malicious application to execute arbitrary code within the context of a 1377 privileged process. This issue is rated as High because it could be used to gain 1378 local access to elevated capabilities, which are not normally accessible to a 1379 third-party application. 1380 </p> 1381 <table> 1382 <col width="19%"> 1383 <col width="20%"> 1384 <col width="10%"> 1385 <col width="23%"> 1386 <col width="17%"> 1387 <tr> 1388 <th>CVE</th> 1389 <th>References</th> 1390 <th>Severity</th> 1391 <th>Updated Nexus devices</th> 1392 <th>Date reported</th> 1393 </tr> 1394 <tr> 1395 <td>CVE-2016-6674</td> 1396 <td>A-30445380*</td> 1397 <td>High</td> 1398 <td>All Nexus</td> 1399 <td>Jul 26, 2016</td> 1400 </tr> 1401 </table> 1402 <p> 1403 * The patch for this issue is not publicly available. The update is contained in 1404 the latest binary drivers for Nexus devices available from the 1405 <a href="https://developers.google.com/android/nexus/drivers">Google Developer 1406 site</a>. 1407 </p> 1408 <h3 id="eopv-in-qualcomm-wi-fi-driver">Elevation 1409 of privilege vulnerability in Qualcomm Wi-Fi driver</h3> 1410 <p> 1411 An elevation of privilege vulnerability in the Qualcomm Wi-Fi driver could 1412 enable a local malicious application to execute arbitrary code within the 1413 context of the kernel. This issue is rated as High because it first requires 1414 compromising a privileged process. 1415 </p> 1416 <table> 1417 <col width="19%"> 1418 <col width="20%"> 1419 <col width="10%"> 1420 <col width="23%"> 1421 <col width="17%"> 1422 <tr> 1423 <th>CVE</th> 1424 <th>References</th> 1425 <th>Severity</th> 1426 <th>Updated Nexus devices</th> 1427 <th>Date reported</th> 1428 </tr> 1429 <tr> 1430 <td>CVE-2016-3905</td> 1431 <td>A-28061823<br> 1432 <a href="https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=b5112838eb91b71eded4b5ee37338535784e0aef">QC-CR#1001449</a></td> 1433 <td>High</td> 1434 <td>Nexus 5X</td> 1435 <td>Google internal</td> 1436 </tr> 1437 <tr> 1438 <td>CVE-2016-6675</td> 1439 <td>A-30873776<br> 1440 <a href="https://source.codeaurora.org/quic/la//platform/vendor/qcom-opensource/wlan/prima/commit/?id=1353fa0bd0c78427f3ae7d9bde7daeb75bd01d09">QC-CR#1000861</a></td> 1441 <td>High</td> 1442 <td>Nexus 5X, Android One</td> 1443 <td>Aug 15, 2016</td> 1444 </tr> 1445 <tr> 1446 <td>CVE-2016-6676</td> 1447 <td>A-30874066<br> 1448 <a href="https://source.codeaurora.org/quic/la//platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=6ba9136879232442a182996427e5c88e5a7512a8">QC-CR#1000853</a></td> 1449 <td>High</td> 1450 <td>Nexus 5X, Android One</td> 1451 <td>Aug 15, 2016</td> 1452 </tr> 1453 <tr> 1454 <td>CVE-2016-5342</td> 1455 <td>A-30878283<br> 1456 <a href="https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=579e796cb089324c55e0e689a180575ba81b23d9">QC-CR#1032174</a></td> 1457 <td>High</td> 1458 <td>Android One</td> 1459 <td>Aug 15, 2016</td> 1460 </tr> 1461 </table> 1462 <h3 1463 id="eopv-in-kernel-performance-subsystem">Elevation 1464 of privilege vulnerability in kernel performance subsystem</h3> 1465 <p> 1466 An elevation of privilege vulnerability in the kernel performance subsystem 1467 could enable a local malicious application to execute arbitrary code within the 1468 context of the kernel. This issue is rated as High because it first requires 1469 compromising a privileged process. 1470 </p> 1471 <table> 1472 <col width="19%"> 1473 <col width="20%"> 1474 <col width="10%"> 1475 <col width="23%"> 1476 <col width="17%"> 1477 <tr> 1478 <th>CVE</th> 1479 <th>References</th> 1480 <th>Severity</th> 1481 <th>Updated Nexus devices</th> 1482 <th>Date reported</th> 1483 </tr> 1484 <tr> 1485 <td>CVE-2015-8955</td> 1486 <td>A-29508816<br> 1487 <a href="https://git.kernel.org/cgit/linux/kernel/git/stable/linux-stable.git/commit/?id=8fff105e13041e49b82f92eef034f363a6b1c071">Upstream kernel</a></td> 1488 <td>High</td> 1489 <td>Nexus 5X, Nexus 6P, Pixel C, Android One</td> 1490 <td>Google internal</td> 1491 </tr> 1492 </table> 1493 <h3 1494 id="information-disclosure-vulnerability-in-kernel-ion-subsystem">Information 1495 disclosure vulnerability in kernel ION subsystem</h3> 1496 <p> 1497 An information disclosure vulnerability in the kernel ION subsystem could enable 1498 a local malicious application to access data outside of its permission levels. 1499 This issue is rated as High because it could be used to access sensitive data 1500 without explicit user permission. 1501 </p> 1502 <table> 1503 <col width="19%"> 1504 <col width="20%"> 1505 <col width="10%"> 1506 <col width="23%"> 1507 <col width="17%"> 1508 <tr> 1509 <th>CVE</th> 1510 <th>References</th> 1511 <th>Severity</th> 1512 <th>Updated Nexus devices</th> 1513 <th>Date reported</th> 1514 </tr> 1515 <tr> 1516 <td>CVE-2015-8950</td> 1517 <td>A-29795245<br> 1518 <a href="https://source.codeaurora.org/quic/la/kernel/msm-3.10/commit/?id=6e2c437a2d0a85d90d3db85a7471f99764f7bbf8">QC-CR#1041735</a></td> 1519 <td>High</td> 1520 <td>Nexus 5, Nexus 5X, Nexus 6, Nexus 6P</td> 1521 <td>May 12, 2016</td> 1522 </tr> 1523 </table> 1524 <h3 id="information-disclosure-vulnerability-in-nvidia-gpu-driver">Information 1525 disclosure vulnerability in NVIDIA GPU driver</h3> 1526 <p> 1527 An information disclosure vulnerability in the NVIDIA GPU driver could enable a 1528 local malicious application to access data outside of its permission levels. 1529 This issue is rated as High because it first requires compromising a 1530 privileged process. 1531 </p> 1532 <table> 1533 <col width="19%"> 1534 <col width="20%"> 1535 <col width="10%"> 1536 <col width="23%"> 1537 <col width="17%"> 1538 <tr> 1539 <th>CVE</th> 1540 <th>References</th> 1541 <th>Severity</th> 1542 <th>Updated Nexus devices</th> 1543 <th>Date reported</th> 1544 </tr> 1545 <tr> 1546 <td>CVE-2016-6677</td> 1547 <td>A-30259955*<br> 1548 N-CVE-2016-6677</td> 1549 <td>High</td> 1550 <td>Nexus 9</td> 1551 <td>Jul 19, 2016</td> 1552 </tr> 1553 </table> 1554 <p> 1555 * The patch for this issue is not publicly available. The update is contained in 1556 the latest binary drivers for Nexus devices available from the 1557 <a href="https://developers.google.com/android/nexus/drivers">Google Developer 1558 site</a>. 1559 </p> 1560 <h3 1561 id="eopv-in-qualcomm-character-driver">Elevation 1562 of privilege vulnerability in Qualcomm character driver</h3> 1563 <p> 1564 An elevation of privilege vulnerability in the Qualcomm character driver could 1565 enable a local malicious application to execute arbitrary code within the 1566 context of the kernel. This issue is rated as Moderate because it first requires 1567 compromising a privileged process, and the vulnerable code is currently not 1568 accessible. 1569 </p> 1570 <table> 1571 <col width="19%"> 1572 <col width="20%"> 1573 <col width="10%"> 1574 <col width="23%"> 1575 <col width="17%"> 1576 <tr> 1577 <th>CVE</th> 1578 <th>References</th> 1579 <th>Severity</th> 1580 <th>Updated Nexus devices</th> 1581 <th>Date reported</th> 1582 </tr> 1583 <tr> 1584 <td>CVE-2015-0572</td> 1585 <td>A-29156684<br> 1586 <a href="https://source.codeaurora.org/quic/la/kernel/msm-3.10/commit/?id=34ad3d34fbff11b8e1210b9da0dac937fb956b61">QC-CR#848489</a></td> 1587 <td>Moderate</td> 1588 <td>Nexus 5X, Nexus 6P</td> 1589 <td>May 28, 2016</td> 1590 </tr> 1591 </table> 1592 <h3 1593 id="information-disclosure-vulnerability-in-qualcomm-sound-driver">Information 1594 disclosure vulnerability in Qualcomm sound driver</h3> 1595 <p> 1596 An information disclosure vulnerability in the Qualcomm sound driver could 1597 enable a local malicious application to access data outside of its permission 1598 levels. This issue is rated as Moderate because it first requires compromising a 1599 privileged process. 1600 </p> 1601 <table> 1602 <col width="19%"> 1603 <col width="20%"> 1604 <col width="10%"> 1605 <col width="23%"> 1606 <col width="17%"> 1607 <tr> 1608 <th>CVE</th> 1609 <th>References</th> 1610 <th>Severity</th> 1611 <th>Updated Nexus devices</th> 1612 <th>Date reported</th> 1613 </tr> 1614 <tr> 1615 <td>CVE-2016-3860</td> 1616 <td>A-29323142<br> 1617 <a href="https://source.codeaurora.org/quic/la/kernel/msm-3.18/diff/sound/soc/msm/qdsp6v2/audio_calibration.c?id=528976f54be246ec93a71ac53aa4faf3e3791c48">QC-CR#1038127</a></td> 1618 <td>Moderate</td> 1619 <td>Nexus 5X, Nexus 6P, Android One</td> 1620 <td>Jun 13, 2016</td> 1621 </tr> 1622 </table> 1623 <h3 1624 id="information-disclosure-vulnerability-in-motorola-usbnet-driver">Information 1625 disclosure vulnerability in Motorola USBNet driver</h3> 1626 <p> 1627 An information disclosure vulnerability in the Motorola USBNet driver could 1628 enable a local malicious application to access data outside of its permission 1629 levels. This issue is rated as Moderate because it first requires compromising a 1630 privileged process. 1631 </p> 1632 <table> 1633 <col width="19%"> 1634 <col width="20%"> 1635 <col width="10%"> 1636 <col width="23%"> 1637 <col width="17%"> 1638 <tr> 1639 <th>CVE</th> 1640 <th>References</th> 1641 <th>Severity</th> 1642 <th>Updated Nexus devices</th> 1643 <th>Date reported</th> 1644 </tr> 1645 <tr> 1646 <td>CVE-2016-6678</td> 1647 <td>A-29914434*</td> 1648 <td>Moderate</td> 1649 <td>Nexus 6</td> 1650 <td>Jun 30, 2016</td> 1651 </tr> 1652 </table> 1653 <p> 1654 * The patch for this issue is not publicly available. The update is contained in 1655 the latest binary drivers for Nexus devices available from the 1656 <a href="https://developers.google.com/android/nexus/drivers">Google Developer 1657 site</a>. 1658 </p> 1659 <h3 id="information-disclosure-vulnerability-in-qualcomm-components">Information 1660 disclosure vulnerability in Qualcomm components</h3> 1661 <p> 1662 An information disclosure vulnerability in Qualcomm components, including the 1663 sound driver, IPA driver and Wi-Fi driver could enable a local malicious 1664 application to access data outside of its permission levels. This issue is rated 1665 as Moderate because it first requires compromising a privileged process. 1666 </p> 1667 <table> 1668 <col width="19%"> 1669 <col width="20%"> 1670 <col width="10%"> 1671 <col width="23%"> 1672 <col width="17%"> 1673 <tr> 1674 <th>CVE</th> 1675 <th>References</th> 1676 <th>Severity</th> 1677 <th>Updated Nexus devices</th> 1678 <th>Date reported</th> 1679 </tr> 1680 <tr> 1681 <td>CVE-2016-6679</td> 1682 <td>A-29915601<br> 1683 <a href="https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/prima/commit/?id=d39345f0abc309959d831d09fcbf1619cc0ae0f5">QC-CR#1000913</a> 1684 [<a href="https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=f081695446679aa44baa0d00940ea18455eeb4c5">2</a>]</td> 1685 <td>Moderate</td> 1686 <td>Nexus 5X, Android One</td> 1687 <td>Jun 30, 2016</td> 1688 </tr> 1689 <tr> 1690 <td>CVE-2016-3902</td> 1691 <td>A-29953313*<br> 1692 <a href="https://source.codeaurora.org/quic/la//kernel/msm-3.10/commit/?id=2fca425d781572393fbe51abe2e27a932d24a768">QC-CR#1044072</a></td> 1693 <td>Moderate</td> 1694 <td>Nexus 5X, Nexus 6P,</td> 1695 <td>Jul 2, 2016</td> 1696 </tr> 1697 <tr> 1698 <td>CVE-2016-6680</td> 1699 <td>A-29982678*<br> 1700 <a href="https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=2f2fa073b95d4700de88c0f7558b4a18c13ac552">QC-CR#1048052</a></td> 1701 <td>Moderate</td> 1702 <td>Nexus 5X, Android One</td> 1703 <td>Jul 3, 2016</td> 1704 </tr> 1705 <tr> 1706 <td>CVE-2016-6681</td> 1707 <td>A-30152182<br> 1708 <a href="https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=0950fbd39ff189497f1b6115825c210e3eeaf395">QC-CR#1049521</a></td> 1709 <td>Moderate</td> 1710 <td>Nexus 5X, Nexus 6P, Android One</td> 1711 <td>Jul 14, 2016</td> 1712 </tr> 1713 <tr> 1714 <td>CVE-2016-6682</td> 1715 <td>A-30152501<br> 1716 <a href="https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=0950fbd39ff189497f1b6115825c210e3eeaf395">QC-CR#1049615</a></td> 1717 <td>Moderate</td> 1718 <td>Nexus 5X, Nexus 6P, Android One</td> 1719 <td>Jul 14, 2016</td> 1720 </tr> 1721 </table> 1722 <p> 1723 * The patch for this issue is not publicly available. The update is contained in 1724 the latest binary drivers for Nexus devices available from the 1725 <a href="https://developers.google.com/android/nexus/drivers">Google Developer 1726 site</a>. 1727 </p> 1728 <h3 id="information-disclosure-vulnerability-in-kernel-components">Information 1729 disclosure vulnerability in kernel components</h3> 1730 <p> 1731 An information disclosure vulnerability in kernel components, including 1732 Binder, Sync, Bluetooth, and Sound driver, could enable a local malicious 1733 application to access data outside of its permission levels. This issue is 1734 rated as Moderate because it first requires compromising a privileged process. 1735 </p> 1736 <table> 1737 <col width="19%"> 1738 <col width="18%"> 1739 <col width="10%"> 1740 <col width="25%"> 1741 <col width="17%"> 1742 <tr> 1743 <th>CVE</th> 1744 <th>References</th> 1745 <th>Severity</th> 1746 <th>Updated Nexus devices</th> 1747 <th>Date reported</th> 1748 </tr> 1749 <tr> 1750 <td>CVE-2016-6683</td> 1751 <td>A-30143283*</td> 1752 <td>Moderate</td> 1753 <td>All Nexus</td> 1754 <td>Jul 13, 2016</td> 1755 </tr> 1756 <tr> 1757 <td>CVE-2016-6684</td> 1758 <td>A-30148243*</td> 1759 <td>Moderate</td> 1760 <td>Nexus 5, Nexus 5X, Nexus 6, Nexus 6P, Nexus 9, Nexus Player, Android One</td> 1761 <td>Jul 13, 2016</td> 1762 </tr> 1763 <tr> 1764 <td>CVE-2015-8956</td> 1765 <td>A-30149612*</td> 1766 <td>Moderate</td> 1767 <td>Nexus 5, Nexus 6P, Android One</td> 1768 <td>Jul 14, 2016</td> 1769 </tr> 1770 <tr> 1771 <td>CVE-2016-6685</td> 1772 <td>A-30402628*</td> 1773 <td>Moderate</td> 1774 <td>Nexus 6P</td> 1775 <td>Jul 25, 2016</td> 1776 </tr> 1777 </table> 1778 <p> 1779 * The patch for this issue is not publicly available. The update is contained in 1780 the latest binary drivers for Nexus devices available from the 1781 <a href="https://developers.google.com/android/nexus/drivers">Google Developer 1782 site</a>. 1783 </p> 1784 <h3 id="information-disclosure-vulnerability-in-nvidia-profiler">Information 1785 disclosure vulnerability in NVIDIA profiler</h3> 1786 <p> 1787 An information disclosure vulnerability in the NVIDIA profiler could enable a 1788 local malicious application to access data outside of its permission levels. 1789 This issue is rated as Moderate because it first requires compromising a 1790 privileged process. 1791 </p> 1792 <table> 1793 <col width="19%"> 1794 <col width="20%"> 1795 <col width="10%"> 1796 <col width="23%"> 1797 <col width="17%"> 1798 <tr> 1799 <th>CVE</th> 1800 <th>References</th> 1801 <th>Severity</th> 1802 <th>Updated Nexus devices</th> 1803 <th>Date reported</th> 1804 </tr> 1805 <tr> 1806 <td>CVE-2016-6686</td> 1807 <td>A-30163101*<br> 1808 N-CVE-2016-6686</td> 1809 <td>Moderate</td> 1810 <td>Nexus 9</td> 1811 <td>Jul 15, 2016</td> 1812 </tr> 1813 <tr> 1814 <td>CVE-2016-6687</td> 1815 <td>A-30162222*<br> 1816 N-CVE-2016-6687</td> 1817 <td>Moderate</td> 1818 <td>Nexus 9</td> 1819 <td>Jul 15, 2016</td> 1820 </tr> 1821 <tr> 1822 <td>CVE-2016-6688</td> 1823 <td>A-30593080*<br> 1824 N-CVE-2016-6688</td> 1825 <td>Moderate</td> 1826 <td>Nexus 9</td> 1827 <td>Aug 2, 2016</td> 1828 </tr> 1829 </table> 1830 <p> 1831 * The patch for this issue is not publicly available. The update is contained in 1832 the latest binary drivers for Nexus devices available from the 1833 <a href="https://developers.google.com/android/nexus/drivers">Google Developer 1834 site</a>. 1835 </p> 1836 <h3 id="information-disclosure-vulnerability-in-kernel">Information disclosure 1837 vulnerability in kernel</h3> 1838 <p> 1839 An information disclosure vulnerability in Binder could enable a local malicious 1840 application to access data outside of its permission levels. This issue is rated 1841 as Moderate because it first requires compromising a privileged process. 1842 </p> 1843 <table> 1844 <col width="19%"> 1845 <col width="20%"> 1846 <col width="10%"> 1847 <col width="23%"> 1848 <col width="17%"> 1849 <tr> 1850 <th>CVE</th> 1851 <th>References</th> 1852 <th>Severity</th> 1853 <th>Updated Nexus devices</th> 1854 <th>Date reported</th> 1855 </tr> 1856 <tr> 1857 <td>CVE-2016-6689</td> 1858 <td>A-30768347*</td> 1859 <td>Moderate</td> 1860 <td>All Nexus</td> 1861 <td>Aug 9, 2016</td> 1862 </tr> 1863 </table> 1864 <p> 1865 * The patch for this issue is not publicly available. The update is contained in 1866 the latest binary drivers for Nexus devices available from the 1867 <a href="https://developers.google.com/android/nexus/drivers">Google Developer 1868 site</a>. 1869 </p> 1870 <h3 id="dosv-in-kernel-networking-subsystem">Denial of service vulnerability 1871 in kernel networking subsystem</h3> 1872 <p> 1873 A denial of service vulnerability in the kernel networking subsystem could 1874 enable an attacker to block access to TCP connections and cause a temporary 1875 remote denial of service. This issue is rated as Moderate because cellular 1876 services are still available and the device is still usable. 1877 </p> 1878 <table> 1879 <col width="19%"> 1880 <col width="18%"> 1881 <col width="10%"> 1882 <col width="25%"> 1883 <col width="17%"> 1884 <tr> 1885 <th>CVE</th> 1886 <th>References</th> 1887 <th>Severity</th> 1888 <th>Updated Nexus devices</th> 1889 <th>Date reported</th> 1890 </tr> 1891 <tr> 1892 <td>CVE-2016-5696</td> 1893 <td>A-30809774<br> 1894 <a href="http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=75ff39ccc1bd5d3c455b6822ab09e533c551f758">Upstream 1895 kernel</a></td> 1896 <td>Moderate</td> 1897 <td>Nexus 5X, Nexus 6, Nexus 6P, Nexus 9, Nexus Player, Pixel C, Android One</td> 1898 <td>Jul 12, 2016</td> 1899 </tr> 1900 </table> 1901 <h3 id="dosv-in-kernel-sound-driver">Denial of service vulnerability in kernel 1902 sound driver</h3> 1903 <p> 1904 A denial of service vulnerability in the kernel could allow a local malicious 1905 application to cause a device reboot. This issue is rated as Low because it is a 1906 temporary denial of service. 1907 </p> 1908 <table> 1909 <col width="19%"> 1910 <col width="18%"> 1911 <col width="10%"> 1912 <col width="25%"> 1913 <col width="17%"> 1914 <tr> 1915 <th>CVE</th> 1916 <th>References</th> 1917 <th>Severity</th> 1918 <th>Updated Nexus devices</th> 1919 <th>Date reported</th> 1920 </tr> 1921 <tr> 1922 <td>CVE-2016-6690</td> 1923 <td>A-28838221*</td> 1924 <td>Low</td> 1925 <td>Nexus 5, Nexus 5X, Nexus 6, Nexus 6P, Nexus Player</td> 1926 <td>May 18, 2016</td> 1927 </tr> 1928 </table> 1929 <p> 1930 * The patch for this issue is not publicly available. The update is contained in 1931 the latest binary drivers for Nexus devices available from the 1932 <a href="https://developers.google.com/android/nexus/drivers">Google Developer 1933 site</a>. 1934 </p> 1935 <h3 id="vulnerabilities-in-qualcomm-components">Vulnerabilities in Qualcomm 1936 components</h3> 1937 <p> 1938 The table below contains a list of security vulnerabilities that affect Qualcomm 1939 components. 1940 </p> 1941 <table> 1942 <col width="19%"> 1943 <col width="20%"> 1944 <col width="10%"> 1945 <col width="23%"> 1946 <col width="17%"> 1947 <tr> 1948 <th>CVE</th> 1949 <th>References</th> 1950 <th>Severity</th> 1951 <th>Updated Nexus devices</th> 1952 <th>Date reported</th> 1953 </tr> 1954 <tr> 1955 <td>CVE-2016-6691</td> 1956 <td><a href="https://source.codeaurora.org/quic/la//platform/frameworks/opt/net/wifi/commit/?id=343f123c396b2a97fc7cce396cd5d99365cb9131">QC-CR#978452</a></td> 1957 <td>High</td> 1958 <td>None</td> 1959 <td>Jul 2016</td> 1960 </tr> 1961 <tr> 1962 <td>CVE-2016-6692</td> 1963 <td><a href="https://source.codeaurora.org/quic/la//kernel/msm-3.18/commit/?id=0f0e7047d39f9fb3a1a7f389918ff79cdb4a50b3">QC-CR#1004933</a></td> 1964 <td>High</td> 1965 <td>None</td> 1966 <td>Aug 2016</td> 1967 </tr> 1968 <tr> 1969 <td>CVE-2016-6693</td> 1970 <td><a href="https://source.codeaurora.org/quic/la//kernel/msm-3.18/commit/?id=ac328eb631fa74a63d5d2583e6bfeeb5a7a2df65">QC-CR#1027585</a></td> 1971 <td>High</td> 1972 <td>None</td> 1973 <td>Aug 2016</td> 1974 </tr> 1975 <tr> 1976 <td>CVE-2016-6694</td> 1977 <td><a href="https://source.codeaurora.org/quic/la//kernel/msm-3.18/commit/?id=961e38553aae8ba9b1af77c7a49acfbb7b0b6f62">QC-CR#1033525</a></td> 1978 <td>High</td> 1979 <td>None</td> 1980 <td>Aug 2016</td> 1981 </tr> 1982 <tr> 1983 <td>CVE-2016-6695</td> 1984 <td><a href="https://source.codeaurora.org/quic/la//kernel/msm-3.18/commit/?id=c319c2b0926d1ea5edb4d0778d88bd3ce37c4b95">QC-CR#1033540</a></td> 1985 <td>High</td> 1986 <td>None</td> 1987 <td>Aug 2016</td> 1988 </tr> 1989 <tr> 1990 <td>CVE-2016-6696</td> 1991 <td><a href="https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=c3c9341bfdf93606983f893a086cb33a487306e5">QC-CR#1041130</a></td> 1992 <td>High</td> 1993 <td>None</td> 1994 <td>Aug 2016</td> 1995 </tr> 1996 <tr> 1997 <td>CVE-2016-5344</td> 1998 <td><a href="https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=64e15c36d6c1c57dc2d95a3f163bc830a469fc20">QC-CR#993650</a></td> 1999 <td>Moderate</td> 2000 <td>None</td> 2001 <td>Aug 2016</td> 2002 </tr> 2003 <tr> 2004 <td>CVE-2016-5343</td> 2005 <td><a href="https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=6927e2e0af4dcac357be86ba563c9ae12354bb08">QC-CR#1010081</a></td> 2006 <td>Moderate</td> 2007 <td>None</td> 2008 <td>Aug 2016</td> 2009 </tr> 2010 </table> 2011 <h2 id="common-questions-and-answers">Common Questions and Answers</h2> 2012 <p> 2013 This section answers common questions that may occur after reading this 2014 bulletin. 2015 </p> 2016 <p> 2017 <strong>1. How do I determine if my device is updated to address these issues? 2018 </strong> 2019 </p> 2020 <p> 2021 Security Patch Levels of 2016-10-01 or later address all issues associated with 2022 the 2016-10-01 security patch string level. Security Patch Levels of 2016-10-05 2023 or later address all issues associated with the 2016-10-05 security patch string 2024 level. Refer to the <a href="https://support.google.com/nexus/answer/4457705">help center</a> for 2025 instructions on how to check the security patch level. Device manufacturers that 2026 include these updates should set the patch string level to: 2027 [ro.build.version.security_patch]:[2016-10-01] or 2028 [ro.build.version.security_patch]:[2016-10-05]. 2029 </p> 2030 <p> 2031 <strong>2. Why does this bulletin have two security patch level 2032 strings?</strong> 2033 </p> 2034 <p> 2035 This bulletin has two security patch level strings so that Android partners have 2036 the flexibility to fix a subset of vulnerabilities that are similar across all 2037 Android devices more quickly. Android partners are encouraged to fix all issues 2038 in this bulletin and use the latest security patch level string. 2039 </p> 2040 <p> 2041 Devices that use the security patch level of October 5, 2016 or newer must 2042 include all applicable patches in this (and previous) security bulletins. 2043 </p> 2044 <p> 2045 Devices that use the October 1, 2016 security patch level must include all 2046 issues associated with that security patch level, as well as fixes for all 2047 issues reported in previous security bulletins. 2048 </p> 2049 <p> 2050 <strong>3. How do I determine which Nexus devices are affected by each 2051 issue?</strong> 2052 </p> 2053 <p> 2054 In the <a href="#2016-10-01-details">2016-10-01</a> and 2055 <a href="#2016-10-05-details">2016-10-05</a> 2056 security vulnerability details sections, each table has an <em>Updated Nexus 2057 devices</em> column that covers the range of affected Nexus devices updated for 2058 each issue. This column has a few options: 2059 </p> 2060 <ul> 2061 <li><strong>All Nexus devices</strong>: If an issue affects all Nexus devices, 2062 the table will have All Nexus in the <em>Updated Nexus devices</em> column. 2063 All Nexus encapsulates the following <a 2064 href="https://support.google.com/nexus/answer/4457705#nexus_devices">supported 2065 devices</a>: Nexus 5, Nexus 5X, Nexus 6, Nexus 6P, Nexus 9, 2066 Android One, Nexus Player and Pixel C.</li> 2067 <li><strong>Some Nexus devices</strong>: If an issue doesnt affect all Nexus 2068 devices, the affected Nexus devices are listed in the <em>Updated Nexus 2069 devices</em> column.</li> 2070 <li><strong>No Nexus devices</strong>: If no Nexus devices running Android 7.0 2071 are affected by the issue, the table will have None in the <em>Updated Nexus 2072 devices</em> column.</li> 2073 </ul> 2074 <p> 2075 <strong>4. What do the entries in the references column map to?</strong> 2076 </p> 2077 <p> 2078 Entries under the <em>References</em> column of the vulnerability details table 2079 may contain a prefix identifying the organization to which the reference value 2080 belongs. These prefixes map as follows: 2081 </p> 2082 <table> 2083 <tr> 2084 <th>Prefix</th> 2085 <th>Reference</th> 2086 </tr> 2087 <tr> 2088 <td>A-</td> 2089 <td>Android bug ID</td> 2090 </tr> 2091 <tr> 2092 <td>QC-</td> 2093 <td>Qualcomm reference number</td> 2094 </tr> 2095 <tr> 2096 <td>M-</td> 2097 <td>MediaTek reference number</td> 2098 </tr> 2099 <tr> 2100 <td>N-</td> 2101 <td>NVIDIA reference number</td> 2102 </tr> 2103 <tr> 2104 <td>B-</td> 2105 <td>Broadcom reference number</td> 2106 </tr> 2107 </table> 2108 2109 <h2 id="revisions">Revisions</h2> 2110 <ul> 2111 <li>October 03, 2016: Bulletin published.</li> 2112 <li>October 04, 2016: Bulletin revised to include AOSP links and update 2113 attributions for CVE-2016-3920, CVE-2016-6693, CVE-2016-6694, 2114 CVE-2016-6695, and CVE-2016-6696.</li> 2115 </ul> 2116 2117 </body> 2118 </html> 2119