Home | History | Annotate | Download | only in bulletin
      1 <html devsite>
      2   <head>
      3     <title>Android Security BulletinDecember 2016</title>
      4     <meta name="project_path" value="/_project.yaml" />
      5     <meta name="book_path" value="/_book.yaml" />
      6   </head>
      7   <body>
      8   <!--
      9       Copyright 2017 The Android Open Source Project
     10 
     11       Licensed under the Apache License, Version 2.0 (the "License");
     12       you may not use this file except in compliance with the License.
     13       You may obtain a copy of the License at
     14 
     15           http://www.apache.org/licenses/LICENSE-2.0
     16 
     17       Unless required by applicable law or agreed to in writing, software
     18       distributed under the License is distributed on an "AS IS" BASIS,
     19       WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
     20       See the License for the specific language governing permissions and
     21       limitations under the License.
     22   -->
     23 
     24 
     25 
     26 <p><em>Published December 05, 2016 | Updated December 21, 2016</em></p>
     27 <p>
     28 The Android Security Bulletin contains details of security vulnerabilities
     29 affecting Android devices. Alongside the bulletin, we have released a security
     30 update to Google devices through an over-the-air (OTA) update. The Google device
     31 firmware images have also been released to the <a
     32 href="https://developers.google.com/android/nexus/images">Google Developer
     33 site</a>. Security patch levels of December 05, 2016 or later address all of
     34 these issues. Refer to the <a
     35 href="https://support.google.com/pixelphone/answer/4457705#pixel_phones&nexus_devices">Pixel
     36 and Nexus update schedule</a> to learn how to check a device's security patch
     37 level.
     38 </p>
     39 <p>
     40 Partners were notified of the issues described in the bulletin on November 07,
     41 2016 or earlier. Source code patches for these issues have been released to the
     42 Android Open Source Project (AOSP) repository and linked from this bulletin.
     43 This bulletin also includes links to patches outside of AOSP.
     44 </p>
     45 <p>
     46 The most severe of these issues are Critical security vulnerabilities in
     47 device-specific code that could enable arbitrary code execution within the
     48 context of the kernel, leading to the possibility of a local permanent device
     49 compromise, which may require reflashing the operating system to repair the
     50 device. The
     51 <a href="/security/overview/updates-resources.html#severity">severity
     52 assessment</a> is based on the effect that exploiting the vulnerability would
     53 possibly have on an affected device, assuming the platform and service
     54 mitigations are disabled for development purposes or if successfully bypassed.
     55 </p>
     56 <p>
     57 We have had no reports of active customer exploitation or abuse of these newly
     58 reported issues. Refer to the <a href="#mitigations">Android and Google service
     59 mitigations</a> section for details on the <a
     60 href="/security/enhancements/index.html">Android
     61 security platform protections</a> and service protections such as <a
     62 href="https://developer.android.com/training/safetynet/index.html">SafetyNet</a>,
     63 which improve the security of the Android platform.
     64 </p>
     65 <p>
     66 We encourage all customers to accept these updates to their devices.
     67 </p>
     68 <h2 id="announcements">Announcements</h2>
     69 <ul>
     70   <li>This bulletin has two security patch level strings to provide Android
     71   partners with the flexibility to more quickly fix a subset of vulnerabilities
     72   that are similar across all Android devices. See
     73   <a href="#common-questions-and-answers">Common
     74   questions and answers</a> for additional information:
     75     <ul>
     76      <li><strong>2016-12-01</strong>: Partial security patch level string. This
     77     security patch level string indicates that all issues associated with 2016-12-01
     78     (and all previous security patch level strings) are addressed.</li>
     79      <li><strong>2016-12-05</strong>: Complete security patch level string. This
     80     security patch level string indicates that all issues associated with 2016-12-01
     81     and 2016-12-05 (and all previous security patch level strings) are addressed.</li>
     82     </ul>
     83   </li>
     84   <li>Supported Google devices will receive a single OTA update with the December
     85   05, 2016 security patch level.</li>
     86 </ul>
     87 <h2 id="mitigations">Android and Google service mitigations</h2>
     88 <p>
     89 This is a summary of the mitigations provided by the <a
     90 href="/security/enhancements/index.html">Android
     91 security platform</a> and service protections, such as SafetyNet. These
     92 capabilities reduce the likelihood that security vulnerabilities could be
     93 successfully exploited on Android.
     94 </p>
     95 <ul>
     96 <li>Exploitation for many issues on Android is made more difficult by
     97 enhancements in newer versions of the Android platform. We encourage all users
     98 to update to the latest version of Android where possible.</li>
     99 <li>The Android Security team actively monitors for abuse with
    100 <a href="http://static.googleusercontent.com/media/source.android.com/en//security/reports/Google_Android_Security_2015_Report_Final.pdf">Verify
    101 Apps and SafetyNet</a>, which are designed to warn users about
    102 <a href="http://static.googleusercontent.com/media/source.android.com/en//security/reports/Google_Android_Security_PHA_classifications.pdf">Potentially
    103 Harmful Applications</a>. Verify Apps is enabled by default on devices with <a
    104 href="http://www.android.com/gms">Google Mobile Services</a> and is especially
    105 important for users who install applications from outside of Google Play. Device
    106 rooting tools are prohibited within Google Play, but Verify Apps warns users
    107 when they attempt to install a detected rooting applicationno matter where it
    108 comes from. Additionally, Verify Apps attempts to identify and block
    109 installation of known malicious applications that exploit a privilege escalation
    110 vulnerability. If such an application has already been installed, Verify Apps
    111 will notify the user and attempt to remove the detected application.</li>
    112 <li>As appropriate, Google Hangouts and Messenger applications do not
    113 automatically pass media to processes such as Mediaserver.</li>
    114 </ul>
    115 
    116 <h2 id="acknowledgements">Acknowledgements</h2>
    117 <p>
    118 We would like to thank these researchers for their contributions:
    119 </p>
    120 
    121 <ul>
    122   <li>Baozeng Ding, Chengming Yang, Peng Xiao, Ning You, Yang Dong, Chao Yang,
    123   Yi Zhang, and Yang Song of Alibaba Mobile Security Group: CVE-2016-6783,
    124   CVE-2016-6784, CVE-2016-6785</li>
    125   <li><a href="mailto:zc1991 (a] mail.ustc.edu.cn">Chi Zhang</a>, Mingjian Zhou (<a
    126   href="https://twitter.com/Mingjian_Zhou">@Mingjian_Zhou</a>), Chiachih Wu (<a
    127   href="https://twitter.com/chiachih_wu">@chiachih_wu</a>), and Xuxian Jiang of <a
    128   href="http://c0reteam.org">C0RE Team</a>: CVE-2016-6789, CVE-2016-6790</li>
    129   <li>Christian Seel: CVE-2016-6769</li>
    130   <li>David Benjamin and Kenny Root of Google: CVE-2016-6767</li>
    131   <li>Di Shen (<a href="https://twitter.com/returnsme">@returnsme</a>) of KeenLab
    132   (<a href="https://twitter.com/keen_lab">@keen_lab</a>), Tencent: CVE-2016-6776,
    133   CVE-2016-6787</li>
    134   <li>En He (<a href="https://twitter.com/heeeeen4x">@heeeeen4x</a>) of <a
    135   href="http://www.ms509.com">MS509Team</a>: CVE-2016-6763</li>
    136   <li>Gengjia Chen (<a href="https://twitter.com/chengjia4574">@chengjia4574</a>),
    137   <a href="http://weibo.com/jfpan">pjf</a> of IceSword Lab, Qihoo 360 Technology
    138   Co. Ltd.: CVE-2016-6779, CVE-2016-6778, CVE-2016-8401, CVE-2016-8402,
    139   CVE-2016-8403, CVE-2016-8409, CVE-2016-8408, CVE-2016-8404</li>
    140   <li>Jianqiang Zhao (<a
    141   href="https://twitter.com/jianqiangzhao">@jianqiangzhao</a>) and <a
    142   href="http://weibo.com/jfpan">pjf</a> of IceSword Lab, Qihoo 360 Technology Co.
    143   Ltd: CVE-2016-6788, CVE-2016-6781, CVE-2016-6782, CVE-2016-8396</li>
    144   <li><a href="mailto:zlbzlb815 (a] 163.com">Lubo Zhang</a>, <a
    145   href="mailto:segfault5514 (a] gmail.com">Tong Lin</a>, <a
    146   href="mailto:computernik (a] gmail.com">Yuan-Tsung Lo</a>, Chiachih Wu (<a
    147   href="https://twitter.com/chiachih_wu">@chiachih_wu</a>), and Xuxian Jiang of <a
    148   href="http://c0reteam.org">C0RE Team</a>: CVE-2016-6791, CVE-2016-8391,
    149   CVE-2016-8392</li>
    150   <li>Mark Brand of Project Zero: CVE-2016-6772</li>
    151   <li><a href="https://github.com/michalbednarski">Micha Bednarski</a>:
    152   CVE-2016-6770, CVE-2016-6774</li>
    153   <li>Mingjian Zhou (<a
    154   href="https://twitter.com/Mingjian_Zhou">@Mingjian_Zhou</a>), <a
    155   href="mailto:zc1991 (a] mail.ustc.edu.cn">Chi Zhang</a>, Chiachih Wu (<a
    156   href="https://twitter.com/chiachih_wu">@chiachih_wu</a>), and Xuxian Jiang of <a
    157   href="http://c0reteam.org">C0RE Team</a>: CVE-2016-6761, CVE-2016-6759,
    158   CVE-2016-8400</li>
    159   <li>Mingjian Zhou (<a
    160   href="https://twitter.com/Mingjian_Zhou">@Mingjian_Zhou</a>), Chiachih Wu (<a
    161   href="https://twitter.com/chiachih_wu">@chiachih_wu</a>), and Xuxian Jiang of <a
    162   href="http://c0reteam.org">C0RE Team</a>: CVE-2016-6760</li>
    163   <li>Mingjian Zhou (<a
    164   href="https://twitter.com/Mingjian_Zhou">@Mingjian_Zhou</a>), <a
    165   href="mailto:arnow117 (a] gmail.com">Hanxiang Wen</a>, Chiachih Wu (<a
    166   href="https://twitter.com/chiachih_wu">@chiachih_wu</a>), and Xuxian Jiang of <a
    167   href="http://c0reteam.org">C0RE Team</a>: CVE-2016-6759</li>
    168   <li>Nathan Crandall (<a href="https://twitter.com/natecray">@natecray</a>) of
    169   Tesla Motors Product Security Team: CVE-2016-6915, CVE-2016-6916, CVE-2016-6917</li>
    170   <li>Nightwatch Cybersecurity Research (<a
    171   href="https://twitter.com/nightwatchcyber">@nightwatchcyber</a>): CVE-2016-5341</li>
    172   <li>Pengfei Ding (), Chenfu Bao (), Lenx Wei () of Baidu X-Lab:
    173   CVE-2016-6755, CVE-2016-6756</li>
    174   <li>Peter Pi (<a href="https://twitter.com/heisecode">@heisecode</a>) of Trend
    175   Micro: CVE-2016-8397, CVE-2016-8405, CVE-2016-8406, CVE-2016-8407</li>
    176   <li>Qidan He () (<a href="https://twitter.com/flanker_hqd">@flanker_hqd</a>)
    177   of KeenLab, Tencent (): CVE-2016-8399, CVE-2016-8395</li>
    178   <li>Qidan He () (<a href="https://twitter.com/flanker_hqd">@flanker_hqd</a>)
    179   and Marco Grassi (<a href="https://twitter.com/marcograss">@marcograss</a>) of
    180   KeenLab, Tencent (): CVE-2016-6768</li>
    181   <li>Richard Shupak: CVE-2016-5341</li>
    182   <li>Sagi Kedmi of IBM X-Force Research: CVE-2016-8393, CVE-2016-8394</li>
    183   <li>Seven Shen (<a href="https://twitter.com/lingtongshen">@lingtongshen</a>) of
    184   Mobile Threat Research Team, Trend Micro Inc.: CVE-2016-6757</li>
    185   <li>Weichao Sun (<a href="https://twitter.com/sunblate">@sunblate</a>) of
    186   Alibaba Inc.: CVE-2016-6773</li>
    187   <li><a href="mailto:vancouverdou (a] gmail.com">Wenke Dou</a>, <a
    188   href="mailto:zc1991 (a] mail.ustc.edu.cn">Chi Zhang</a>, Chiachih Wu (<a
    189   href="https://twitter.com/chiachih_wu">@chiachih_wu</a>), and Xuxian Jiang of <a
    190   href="http://c0reteam.org">C0RE Team</a>: CVE-2016-6765</li>
    191   <li>Wish Wu (<a href="https://twitter.com/wish_wu">@wish_wu</a>) (<a
    192   href="http://weibo.com/wishlinux"></a>) of <a
    193   href="http://blog.trendmicro.com/trendlabs-security-intelligence/category/mobile/">Mobile
    194   Threat Response Team</a>, <a href="http://www.trendmicro.com">Trend Micro
    195   Inc.</a>: CVE-2016-6704</li>
    196   <li><a href="mailto:computernik (a] gmail.com">Yuan-Tsung Lo</a>, <a
    197   href="mailto:segfault5514 (a] gmail.com">Tong Lin</a>, Chiachih Wu (<a
    198   href="https://twitter.com/chiachih_wu">@chiachih_wu</a>), and Xuxian Jiang of <a
    199   href="http://c0reteam.org">C0RE Team</a>: CVE-2016-6786, CVE-2016-6780,
    200   CVE-2016-6775</li>
    201   <li><a href="mailto:computernik (a] gmail.com">Yuan-Tsung Lo</a>, <a
    202   href="mailto:wisedd (a] gmail.com">Xiaodong Wang</a>, Chiachih Wu (<a
    203   href="https://twitter.com/chiachih_wu">@chiachih_wu</a>), and Xuxian Jiang of <a
    204   href="http://c0reteam.org">C0RE Team</a>: CVE-2016-6777</li>
    205   <li>Yuxiang Li of Tencent Security Platform Department: CVE-2016-6771</li>
    206   <li>Zhe Jin () of Chengdu Security Response Center, Qihoo 360 Technology Co.
    207   Ltd.: CVE-2016-6764, CVE-2016-6766</li>
    208   <li><a href="http://weibo.com/ele7enxxh">Zinuo Han</a>  of Chengdu Security
    209   Response Center of Qihoo 360 Technology Co. Ltd.: CVE-2016-6762</li>
    210 </ul>
    211 <p>
    212 Additional thanks to thank MengLuo Gou (<a
    213 href="https://twitter.com/idhyt3r">@idhyt3r</a>) of Bottle Tech, Yong Wang ()
    214 (<a href="https://twitter.com/ThomasKing2014">@ThomasKing2014</a>), and Zubin
    215 Mithra of Google for their contributions to this security bulletin.
    216 </p>
    217 
    218 <h2 id="2016-12-01-details">2016-12-01 security patch levelVulnerability
    219 details</h2>
    220 <p>
    221 In the sections below, we provide details for each of the security
    222 vulnerabilities that apply to the 2016-12-01 patch level. There is a description of
    223 the issue, a severity rationale, and a table with the CVE, associated
    224 references, severity, updated Google devices, updated AOSP versions (where
    225 applicable), and date reported. When available, we will link the public change
    226 that addressed the issue to the bug ID, like the AOSP change list. When multiple
    227 changes relate to a single bug, additional references are linked to numbers
    228 following the bug ID.</p>
    229 
    230 
    231 <h3 id="rce-in-curl-libcurl">Remote code execution vulnerability in
    232 CURL/LIBCURL</h3>
    233 <p>
    234 The table contains security vulnerabilities affecting the CURL and LIBCURL
    235 libraries. The most severe issue could enable a man-in-the-middle attacker
    236 using a forged certificate to execute arbitrary code within the context of a
    237 privileged process. This issue is rated as High due to the attacker needing a
    238 forged certificate.
    239 </p>
    240 
    241 <table>
    242   <col width="18%">
    243   <col width="18%">
    244   <col width="10%">
    245   <col width="19%">
    246   <col width="17%">
    247   <col width="17%">
    248   <tr>
    249     <th>CVE</th>
    250     <th>References</th>
    251     <th>Severity</th>
    252     <th>Updated Google devices</th>
    253     <th>Updated AOSP versions</th>
    254     <th>Date reported</th>
    255   </tr>
    256   <tr>
    257     <td>CVE-2016-5419</td>
    258     <td>A-31271247</td>
    259     <td>High</td>
    260     <td>All</td>
    261     <td>7.0</td>
    262     <td>Aug 3, 2016</td>
    263   </tr>
    264   <tr>
    265     <td>CVE-2016-5420</td>
    266     <td>A-31271247</td>
    267     <td>High</td>
    268     <td>All</td>
    269     <td>7.0</td>
    270     <td>Aug 3, 2016</td>
    271   </tr>
    272   <tr>
    273     <td>CVE-2016-5421</td>
    274     <td>A-31271247</td>
    275     <td>High</td>
    276     <td>All</td>
    277     <td>7.0</td>
    278     <td>Aug 3, 2016</td>
    279   </tr>
    280 </table>
    281 
    282 
    283 <h3 id="eop-in-libziparchive">Elevation of privilege vulnerability in
    284 libziparchive</h3>
    285 <p>
    286 An elevation of privilege vulnerability in the libziparchive library could
    287 enable a local malicious application to execute arbitrary code within the
    288 context of a privileged process. This issue is rated as High because it could
    289 be used to gain local access to elevated capabilities, which are not normally
    290 accessible to a third-party application.
    291 </p>
    292 
    293 <table>
    294   <col width="18%">
    295   <col width="18%">
    296   <col width="10%">
    297   <col width="19%">
    298   <col width="17%">
    299   <col width="17%">
    300   <tr>
    301     <th>CVE</th>
    302     <th>References</th>
    303     <th>Severity</th>
    304     <th>Updated Google devices</th>
    305     <th>Updated AOSP versions</th>
    306     <th>Date reported</th>
    307   </tr>
    308   <tr>
    309     <td>CVE-2016-6762</td>
    310    <td><a href="https://android.googlesource.com/platform/system/core/+/1ee4892e66ba314131b7ecf17e98bb1762c4b84c">
    311        A-31251826</a>
    312       [<a href="https://android.googlesource.com/platform/bionic/+/3656958a16590d07d1e25587734e000beb437740">2</a>]
    313    </td>
    314     <td>High</td>
    315     <td>All</td>
    316     <td>5.0.2, 5.1.1, 6.0, 6.0.1, 7.0</td>
    317     <td>Aug 28, 2016</td>
    318   </tr>
    319 </table>
    320 
    321 
    322 <h3 id="dos-in-telephony">Denial of service vulnerability in Telephony</h3>
    323 <p>
    324 A denial of service vulnerability in Telephony could enable a local malicious
    325 application to use a specially crafted file to cause a device hang or reboot.
    326 This issue is rated as High due to the possibility of local permanent denial of
    327 service.
    328 </p>
    329 
    330 <table>
    331   <col width="18%">
    332   <col width="18%">
    333   <col width="10%">
    334   <col width="19%">
    335   <col width="17%">
    336   <col width="17%">
    337   <tr>
    338     <th>CVE</th>
    339     <th>References</th>
    340     <th>Severity</th>
    341     <th>Updated Google devices</th>
    342     <th>Updated AOSP versions</th>
    343     <th>Date reported</th>
    344   </tr>
    345   <tr>
    346     <td>CVE-2016-6763</td>
    347     <td><a href="https://android.googlesource.com/platform/packages/services/Telephony/+/1294620627b1e9afdf4bd0ad51c25ed3daf80d84">
    348         A-31530456</a></td>
    349     <td>High</td>
    350     <td>All</td>
    351     <td>4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0</td>
    352     <td>Sep 12, 2016</td>
    353   </tr>
    354 </table>
    355 
    356 
    357 <h3 id="dos-in-mediaserver">Denial of service vulnerability in Mediaserver</h3>
    358 <p>
    359 A denial of service vulnerability in Mediaserver could enable an attacker to
    360 use a specially crafted file to cause a device hang or reboot. This issue is
    361 rated as High due to the possibility of remote denial of service.
    362 </p>
    363 
    364 <table>
    365   <col width="18%">
    366   <col width="18%">
    367   <col width="10%">
    368   <col width="19%">
    369   <col width="17%">
    370   <col width="17%">
    371   <tr>
    372     <th>CVE</th>
    373     <th>References</th>
    374     <th>Severity</th>
    375     <th>Updated Google devices</th>
    376     <th>Updated AOSP versions</th>
    377     <th>Date reported</th>
    378   </tr>
    379   <tr>
    380    <td>CVE-2016-6766 </td>
    381    <td><a href="https://android.googlesource.com/platform/frameworks/av/+/0d13824315b0491d44e9c6eb5db06489ab0fcc20">
    382        A-31318219</a></td>
    383    <td>High</td>
    384    <td>All</td>
    385    <td>4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0</td>
    386    <td>Sep 5, 2016</td>
    387   </tr>
    388   <tr>
    389    <td>CVE-2016-6765</td>
    390    <td><a href="https://android.googlesource.com/platform/frameworks/av/+/fd9cc97d4dfe2a2fbce2c0f1704d7a27ce7cbc44">
    391        A-31449945</a></td>
    392    <td>High</td>
    393    <td>All</td>
    394    <td>4.4.4, 5.0.2, 5.1.1, 7.0</td>
    395    <td>Sep 13, 2016</td>
    396   </tr>
    397   <tr>
    398    <td>CVE-2016-6764</td>
    399    <td><a href="https://android.googlesource.com/platform/frameworks/av/+/0d13824315b0491d44e9c6eb5db06489ab0fcc20">
    400        A-31681434</a></td>
    401    <td>High</td>
    402    <td>All</td>
    403    <td>4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0</td>
    404    <td>Sep 22, 2016</td>
    405   </tr>
    406   <tr>
    407    <td>CVE-2016-6767</td>
    408    <td>A-31833604</td>
    409    <td>High</td>
    410    <td>None*</td>
    411    <td>4.4.4</td>
    412    <td>Google internal</td>
    413   </tr>
    414 </table>
    415 
    416 <p>
    417 * Supported Google devices on Android 7.0 or later that have installed all
    418 available updates are not affected by this vulnerability.
    419 </p>
    420 
    421 
    422 <h3 id="rce-in-framesequence-library">Remote Code Execution vulnerability in
    423 Framesequence library</h3>
    424 <p>
    425 A remote code execution vulnerability in the Framesequence library could enable
    426 an attacker using a specially crafted file to execute arbitrary code in the
    427 context of an unprivileged process. This issue is rated as High due to the
    428 possibility of remote code execution in an application that uses the
    429 Framesequence library.
    430 </p>
    431 
    432 <table>
    433   <col width="18%">
    434   <col width="18%">
    435   <col width="10%">
    436   <col width="19%">
    437   <col width="17%">
    438   <col width="17%">
    439   <tr>
    440     <th>CVE</th>
    441     <th>References</th>
    442     <th>Severity</th>
    443     <th>Updated Google devices</th>
    444     <th>Updated AOSP versions</th>
    445     <th>Date reported</th>
    446   </tr>
    447   <tr>
    448     <td>CVE-2016-6768</td>
    449     <td><a href="https://android.googlesource.com/platform/frameworks/ex/+/0ada9456d0270cb0e357a43d9187a6418d770760">
    450         A-31631842</a></td>
    451     <td>High</td>
    452     <td>All</td>
    453     <td>5.0.2, 5.1.1, 6.0, 6.0.1, 7.0</td>
    454     <td>Sep 19, 2016</td>
    455   </tr>
    456 </table>
    457 
    458 
    459 <h3 id="eop-in-smart-lock">Elevation of privilege vulnerability in Smart
    460 Lock</h3>
    461 <p>
    462 An elevation of privilege vulnerability in Smart Lock could enable a local
    463 malicious user to access Smart Lock settings without a PIN. This issue is rated
    464 as Moderate because it first requires physical access to an unlocked device
    465 where Smart Lock was the last settings pane accessed by the user.
    466 </p>
    467 
    468 <table>
    469   <col width="18%">
    470   <col width="18%">
    471   <col width="10%">
    472   <col width="19%">
    473   <col width="17%">
    474   <col width="17%">
    475   <tr>
    476     <th>CVE</th>
    477     <th>References</th>
    478     <th>Severity</th>
    479     <th>Updated Google devices</th>
    480     <th>Updated AOSP versions</th>
    481     <th>Date reported</th>
    482   </tr>
    483   <tr>
    484     <td>CVE-2016-6769</td>
    485     <td>A-29055171</td>
    486     <td>Moderate</td>
    487     <td>None*</td>
    488     <td>5.0.2, 5.1.1, 6.0, 6.0.1</td>
    489     <td>May 27, 2016</td>
    490   </tr>
    491 </table>
    492 <p>
    493 * Supported Google devices on Android 7.0 or later that have installed all
    494 available updates are not affected by this vulnerability.
    495 </p>
    496 
    497 
    498 <h3 id="eop-in-framework-apis">Elevation of privilege vulnerability in
    499 Framework APIs</h3>
    500 <p>
    501 An elevation of privilege vulnerability in the Framework API could enable a
    502 local malicious application to access system functions beyond its access level.
    503 This issue is rated as Moderate because it is a local bypass of restrictions on
    504 a constrained process.
    505 </p>
    506 
    507 <table>
    508   <col width="18%">
    509   <col width="18%">
    510   <col width="10%">
    511   <col width="19%">
    512   <col width="17%">
    513   <col width="17%">
    514   <tr>
    515     <th>CVE</th>
    516     <th>References</th>
    517     <th>Severity</th>
    518     <th>Updated Google devices</th>
    519     <th>Updated AOSP versions</th>
    520     <th>Date reported</th>
    521   </tr>
    522   <tr>
    523     <td>CVE-2016-6770</td>
    524     <td><a href="https://android.googlesource.com/platform/frameworks/base/+/2c61c57ac53cbb270b4e76b9d04465f8a3f6eadc">
    525         A-30202228</a></td>
    526     <td>Moderate</td>
    527     <td>All</td>
    528     <td>4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0</td>
    529     <td>Jul 16, 2016</td>
    530   </tr>
    531 </table>
    532 
    533 
    534 <h3 id="eop-in-telephony">Elevation of privilege vulnerability in
    535 Telephony</h3>
    536 <p>
    537 An elevation of privilege vulnerability in Telephony could enable a local
    538 malicious application to access system functions beyond its access level. This
    539 issue is rated as Moderate because it is a local bypass of restrictions on a
    540 constrained process.
    541 </p>
    542 
    543 <table>
    544   <col width="18%">
    545   <col width="18%">
    546   <col width="10%">
    547   <col width="19%">
    548   <col width="17%">
    549   <col width="17%">
    550   <tr>
    551     <th>CVE</th>
    552     <th>References</th>
    553     <th>Severity</th>
    554     <th>Updated Google devices</th>
    555     <th>Updated AOSP versions</th>
    556     <th>Date reported</th>
    557   </tr>
    558   <tr>
    559     <td>CVE-2016-6771</td>
    560     <td><a href="https://android.googlesource.com/platform/packages/services/Telephony/+/a39ff9526aee6f2ea4f6e02412db7b33d486fd7d">
    561         A-31566390</a></td>
    562     <td>Moderate</td>
    563     <td>All</td>
    564     <td>6.0, 6.0.1, 7.0</td>
    565     <td>Sep 17, 2016</td>
    566   </tr>
    567 </table>
    568 
    569 
    570 <h3 id="eop-in-wi-fi">Elevation of privilege vulnerability in Wi-Fi</h3>
    571 <p>
    572 An elevation of privilege vulnerability in Wi-Fi could enable a local malicious
    573 application to execute arbitrary code within the context of a privileged
    574 process. This issue is rated as Moderate because it first requires compromising
    575 a privileged process.
    576 </p>
    577 
    578 <table>
    579   <col width="18%">
    580   <col width="18%">
    581   <col width="10%">
    582   <col width="19%">
    583   <col width="17%">
    584   <col width="17%">
    585   <tr>
    586     <th>CVE</th>
    587     <th>References</th>
    588     <th>Severity</th>
    589     <th>Updated Google devices</th>
    590     <th>Updated AOSP versions</th>
    591     <th>Date reported</th>
    592   </tr>
    593   <tr>
    594     <td>CVE-2016-6772</td>
    595     <td><a href="https://android.googlesource.com/platform/frameworks/opt/net/wifi/+/a5a18239096f6faee80f15f3fff39c3311898484">
    596         A-31856351</a>
    597        [<a href="https://android.googlesource.com/platform/frameworks/opt/net/wifi/+/29a2baf3195256bab6a0a4a2d07b7f2efa46b614">2</a>]</td>
    598     <td>Moderate</td>
    599     <td>All</td>
    600     <td>5.0.2, 5.1.1, 6.0, 6.0.1, 7.0</td>
    601     <td>Sep 30, 2016</td>
    602   </tr>
    603 </table>
    604 
    605 
    606 <h3 id="id-in-mediaserver">Information disclosure vulnerability in
    607 Mediaserver</h3>
    608 <p>
    609 An information disclosure vulnerability in Mediaserver could enable a local
    610 malicious application to access data outside of its permission levels. This
    611 issue is rated as Moderate because it could be used to access sensitive data
    612 without permission.
    613 </p>
    614 
    615 <table>
    616   <col width="18%">
    617   <col width="18%">
    618   <col width="10%">
    619   <col width="19%">
    620   <col width="17%">
    621   <col width="17%">
    622   <tr>
    623     <th>CVE</th>
    624     <th>References</th>
    625     <th>Severity</th>
    626     <th>Updated Google devices</th>
    627     <th>Updated AOSP versions</th>
    628     <th>Date reported</th>
    629   </tr>
    630   <tr>
    631     <td>CVE-2016-6773</td>
    632     <td><a href="https://android.googlesource.com/platform/external/libavc/+/026745ef046e646b8d04f4f57d8320042f6b29b0">
    633         A-30481714</a>
    634        [<a href="https://android.googlesource.com/platform/external/libavc/+/6676aeb4195e7c7379915c0972f3d209410f0641">2</a>]</td>
    635     <td>Moderate</td>
    636     <td>All</td>
    637     <td>6.0, 6.0.1, 7.0</td>
    638     <td>Jul 27, 2016</td>
    639   </tr>
    640 </table>
    641 
    642 
    643 <h3 id="id-in-package-manager">Information disclosure vulnerability in Package
    644 Manager</h3>
    645 <p>
    646 An information disclosure vulnerability in Package Manager could enable a local
    647 malicious application to bypass operating system protections that isolate
    648 application data from other applications. This issue is rated as Moderate
    649 because it first requires compromising a privileged process.
    650 </p>
    651 
    652 <table>
    653   <col width="18%">
    654   <col width="18%">
    655   <col width="10%">
    656   <col width="19%">
    657   <col width="17%">
    658   <col width="17%">
    659   <tr>
    660     <th>CVE</th>
    661     <th>References</th>
    662     <th>Severity</th>
    663     <th>Updated Google devices</th>
    664     <th>Updated AOSP versions</th>
    665     <th>Date reported</th>
    666   </tr>
    667   <tr>
    668     <td>CVE-2016-6774</td>
    669     <td><a href="https://android.googlesource.com/platform/frameworks/base/+/e2d4f5fc313ecb4ba587b20fff6d346f8cd51775">
    670         A-31251489</a></td>
    671     <td>Moderate</td>
    672     <td>All</td>
    673     <td>7.0</td>
    674     <td>Aug 29, 2016</td>
    675   </tr>
    676 </table>
    677 
    678 
    679 <h2 id="2016-12-05-details">2016-12-05 security patch levelVulnerability
    680 details</h2>
    681 <p>
    682 In the sections below, we provide details for each of the security
    683 vulnerabilities that apply to the 2016-12-05 patch level. There is a description of
    684 the issue, a severity rationale, and a table with the CVE, associated
    685 references, severity, updated Google devices, updated AOSP versions (where
    686 applicable), and date reported. When available, we will link the public change
    687 that addressed the issue to the bug ID, like the AOSP change list. When multiple
    688 changes relate to a single bug, additional references are linked to numbers
    689 following the bug ID.</p>
    690 
    691 <h3 id="eop-in-kernel-memory-subsystem">Elevation of privilege vulnerability in
    692 kernel memory subsystem</h3>
    693 <p>
    694 An elevation of privilege vulnerability in the kernel memory subsystem could
    695 enable a local malicious application to execute arbitrary code within the
    696 context of the kernel. This issue is rated as Critical due to the possibility
    697 of a local permanent device compromise, which may require reflashing the
    698 operating system to repair the device.
    699 </p>
    700 
    701 <table>
    702   <col width="19%">
    703   <col width="20%">
    704   <col width="10%">
    705   <col width="23%">
    706   <col width="17%">
    707   <tr>
    708     <th>CVE</th>
    709     <th>References</th>
    710     <th>Severity</th>
    711     <th>Updated Google devices</th>
    712     <th>Date reported</th>
    713   </tr>
    714   <tr>
    715     <td>CVE-2016-4794</td>
    716     <td>A-31596597<br>
    717        <a href="http://git.kernel.org/cgit/linux/kernel/git/stable/linux-stable.git/commit/?id=6710e594f71ccaad8101bc64321152af7cd9ea28">
    718        Upstream kernel</a>
    719       [<a href="http://git.kernel.org/cgit/linux/kernel/git/stable/linux-stable.git/commit/?id=4f996e234dad488e5d9ba0858bc1bae12eff82c3">2</a>]</td>
    720     <td>Critical</td>
    721     <td>Pixel C, Pixel, Pixel XL</td>
    722     <td>Apr 17, 2016</td>
    723   </tr>
    724   <tr>
    725     <td>CVE-2016-5195</td>
    726     <td>A-32141528<br>
    727        <a href="https://git.kernel.org/cgit/linux/kernel/git/stable/linux-stable.git/commit/?id=9691eac5593ff1e2f82391ad327f21d90322aec1">
    728        Upstream kernel</a>
    729       [<a href="https://git.kernel.org/cgit/linux/kernel/git/stable/linux-stable.git/commit/?id=e45a502bdeae5a075257c4f061d1ff4ff0821354">2</a>]</td>
    730     <td>Critical</td>
    731     <td>Nexus 5X, Nexus 6, Nexus 6P, Nexus 9, Android One, Pixel C, Nexus
    732 Player, Pixel, Pixel XL</td>
    733     <td>Oct 12, 2016</td>
    734   </tr>
    735 </table>
    736 
    737 
    738 <h3 id="eop-in-nvidia-gpu-driver">Elevation of privilege vulnerability in
    739 NVIDIA GPU driver</h3>
    740 <p>
    741 An elevation of privilege vulnerability in the NVIDIA GPU driver could enable a
    742 local malicious application to execute arbitrary code within the context of the
    743 kernel. This issue is rated as Critical due to the possibility of a local
    744 permanent device compromise, which may require reflashing the operating system
    745 to repair the device.
    746 </p>
    747 
    748 <table>
    749   <col width="19%">
    750   <col width="20%">
    751   <col width="10%">
    752   <col width="23%">
    753   <col width="17%">
    754   <tr>
    755     <th>CVE</th>
    756     <th>References</th>
    757     <th>Severity</th>
    758     <th>Updated Google devices</th>
    759     <th>Date reported</th>
    760   </tr>
    761   <tr>
    762     <td>CVE-2016-6775</td>
    763     <td>A-31222873*<br>N-CVE-2016-6775</td>
    764     <td>Critical</td>
    765     <td>Nexus 9</td>
    766     <td>Aug 25, 2016</td>
    767   </tr>
    768   <tr>
    769     <td>CVE-2016-6776</td>
    770     <td>A-31680980*<br>N-CVE-2016-6776</td>
    771     <td>Critical</td>
    772     <td>Nexus 9</td>
    773     <td>Sep 22, 2016</td>
    774   </tr>
    775   <tr>
    776     <td>CVE-2016-6777</td>
    777     <td>A-31910462*<br>N-CVE-2016-6777</td>
    778     <td>Critical</td>
    779     <td>Nexus 9</td>
    780     <td>Oct 3, 2016</td>
    781   </tr>
    782 </table>
    783 <p>
    784 * The patch for this issue is not publicly available. The update is contained in
    785 the latest binary drivers for Google devices available from the <a
    786 href="https://developers.google.com/android/nexus/drivers">Google Developer
    787 site</a>.
    788 </p>
    789 
    790 <h3 id="eop-in-kernel">Elevation of privilege vulnerability in kernel</h3>
    791 <p>
    792 An elevation of privilege vulnerability in the kernel could enable a local
    793 malicious application to execute arbitrary code within the context of the
    794 kernel. This issue is rated as Critical due to the possibility of a local
    795 permanent device compromise, which may require reflashing the operating system
    796 to repair the device.
    797 </p>
    798 
    799 <table>
    800   <col width="19%">
    801   <col width="20%">
    802   <col width="10%">
    803   <col width="23%">
    804   <col width="17%">
    805   <tr>
    806     <th>CVE</th>
    807     <th>References</th>
    808     <th>Severity</th>
    809     <th>Updated Google devices</th>
    810     <th>Date reported</th>
    811   </tr>
    812   <tr>
    813     <td>CVE-2015-8966</td>
    814     <td>A-31435731<br>
    815         <a
    816 href="https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=76cc404bfdc0d419c720de4daaf2584542734f42">
    817 Upstream kernel</a></td>
    818     <td>Critical</td>
    819     <td>None*</td>
    820     <td>Sep 10, 2016</td>
    821   </tr>
    822 </table>
    823 <p>
    824 * Supported Google devices on Android 7.0 or later that have installed all
    825 available updates are not affected by this vulnerability.
    826 </p>
    827 
    828 
    829 <h3 id="eop-in-nvidia-video-driver">Elevation of privilege vulnerability in
    830 NVIDIA video driver</h3>
    831 <p>
    832 An elevation of privilege vulnerability in the NVIDIA video driver could enable
    833 a local malicious application to execute arbitrary code within the context of
    834 the kernel. This issue is rated as Critical due to the possibility of a local
    835 permanent device compromise, which may require reflashing the operating system
    836 to repair the device.
    837 </p>
    838 
    839 <table>
    840   <col width="19%">
    841   <col width="20%">
    842   <col width="10%">
    843   <col width="23%">
    844   <col width="17%">
    845   <tr>
    846     <th>CVE</th>
    847     <th>References</th>
    848     <th>Severity</th>
    849     <th>Updated Google devices</th>
    850     <th>Date reported</th>
    851   </tr>
    852   <tr>
    853     <td>CVE-2016-6915</td>
    854     <td>A-31471161*
    855     <br>N-CVE-2016-6915</td>
    856     <td>Critical</td>
    857     <td>Nexus 9</td>
    858     <td>Sep 13, 2016</td>
    859   </tr>
    860   <tr>
    861     <td>CVE-2016-6916</td>
    862     <td>A-32072350*
    863     <br>N-CVE-2016-6916</td>
    864     <td>Critical</td>
    865     <td>Nexus 9, Pixel C</td>
    866     <td>Sep 13, 2016</td>
    867   </tr>
    868   <tr>
    869     <td>CVE-2016-6917</td>
    870     <td>A-32072253*
    871     <br>N-CVE-2016-6917</td>
    872     <td>Critical</td>
    873     <td>Nexus 9</td>
    874     <td>Sep 13, 2016</td>
    875   </tr>
    876 </table>
    877 <p>
    878 * The patch for this issue is not publicly available. The update is contained in
    879 the latest binary drivers for Google devices available from the <a
    880 href="https://developers.google.com/android/nexus/drivers">Google Developer
    881 site</a>.
    882 </p>
    883 
    884 <h3 id="eop-in-kernel-ion-driver">Elevation of privilege vulnerability in
    885 kernel ION driver</h3>
    886 <p>
    887 An elevation of privilege vulnerability in the kernel ION driver could enable a
    888 local malicious application to execute arbitrary code within the context of the
    889 kernel. This issue is rated as Critical due to the possibility of a local
    890 permanent device compromise, which may require reflashing the operating system
    891 to repair the device.
    892 </p>
    893 
    894 <table>
    895   <col width="19%">
    896   <col width="20%">
    897   <col width="10%">
    898   <col width="23%">
    899   <col width="17%">
    900   <tr>
    901     <th>CVE</th>
    902     <th>References</th>
    903     <th>Severity</th>
    904     <th>Updated Google devices</th>
    905     <th>Date reported</th>
    906   </tr>
    907   <tr>
    908     <td>CVE-2016-9120</td>
    909     <td>A-31568617<br>
    910         <a
    911 href="http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=9590232bb4f4cc824f3425a6e1349afbe6d6d2b7">
    912 Upstream kernel</a></td>
    913     <td>Critical</td>
    914     <td>Nexus 5X, Nexus 6, Nexus 6P, Android One, Pixel C, Nexus Player</td>
    915     <td>Sep 16, 2016</td>
    916   </tr>
    917 </table>
    918 
    919 <h3 id="vulnerabilities-in-qc-components">Vulnerabilities in Qualcomm components</h3>
    920 <p>
    921 The following vulnerabilities affects Qualcomm components and is described in
    922 further detail in Qualcomm AMSS November 2015 security bulletin.
    923 </p>
    924 <table>
    925   <col width="19%">
    926   <col width="20%">
    927   <col width="10%">
    928   <col width="23%">
    929   <col width="17%">
    930   <tr>
    931    <th>CVE</th>
    932    <th>References</th>
    933    <th>Severity*</th>
    934    <th>Updated Google devices</th>
    935    <th>Date reported</th>
    936   </tr>
    937   <tr>
    938    <td>CVE-2016-8411</td>
    939    <td>A-31805216**</td>
    940    <td>Critical</td>
    941    <td>Nexus 6, Nexus 6P, Android One</td>
    942    <td>Qualcomm internal</td>
    943   </tr>
    944 </table>
    945 <p>* The severity rating for these vulnerabilities was determined by the vendor.</p>
    946 <p>** The patch for this issue is not publicly available. The update is contained in
    947 the latest binary drivers for Google devices available from the <a
    948 href="https://developers.google.com/android/nexus/drivers">Google Developer
    949 site</a>.
    950 </p>
    951 
    952 <h3 id="eop-in-kernel-file-system">Elevation of privilege vulnerability in
    953 kernel file system</h3>
    954 <p>
    955 An elevation of privilege vulnerability in the kernel file system could enable
    956 a local malicious application to bypass operating system protections that
    957 isolate application data from other applications. This issue is rated as High
    958 because it could be used to gain local access to elevated capabilities, which
    959 are not normally accessible to a third-party application.
    960 </p>
    961 
    962 <table>
    963   <col width="19%">
    964   <col width="20%">
    965   <col width="10%">
    966   <col width="23%">
    967   <col width="17%">
    968   <tr>
    969     <th>CVE</th>
    970     <th>References</th>
    971     <th>Severity</th>
    972     <th>Updated Google devices</th>
    973     <th>Date reported</th>
    974   </tr>
    975   <tr>
    976     <td>CVE-2014-4014</td>
    977     <td>A-31252187<br>
    978         <a
    979 href="https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=23adbe12ef7d3d4195e80800ab36b37bee28cd03">
    980 Upstream kernel</a></td>
    981     <td>High</td>
    982     <td>Nexus 6, Nexus Player</td>
    983     <td>Jun 10, 2014</td>
    984   </tr>
    985 </table>
    986 
    987 
    988 <h3 id="eop-in-kernel-2">Elevation of privilege vulnerability in kernel</h3>
    989 <p>
    990 An elevation of privilege vulnerability in the kernel could enable a local
    991 malicious application to to execute arbitrary code within the context of the
    992 kernel. This issue is rated as High because it first requires exploitation of a
    993 separate vulnerability.
    994 </p>
    995 
    996 <table>
    997   <col width="19%">
    998   <col width="20%">
    999   <col width="10%">
   1000   <col width="23%">
   1001   <col width="17%">
   1002   <tr>
   1003     <th>CVE</th>
   1004     <th>References</th>
   1005     <th>Severity</th>
   1006     <th>Updated Google devices</th>
   1007     <th>Date reported</th>
   1008   </tr>
   1009   <tr>
   1010     <td>CVE-2015-8967</td>
   1011     <td>A-31703084<br>
   1012         <a
   1013 href="http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=c623b33b4e9599c6ac5076f7db7369eb9869aa04">
   1014 Upstream kernel</a></td>
   1015     <td>High</td>
   1016     <td>Nexus 5X, Nexus 6P, Nexus 9, Pixel C, Pixel, Pixel XL</td>
   1017     <td>Jan 8, 2015</td>
   1018   </tr>
   1019 </table>
   1020 
   1021 
   1022 <h3 id="eop-in-htc-sound-codec-driver">Elevation of privilege vulnerability in
   1023 HTC sound codec driver</h3>
   1024 <p>
   1025 An elevation of privilege vulnerability in the HTC sound codec driver could
   1026 enable a local malicious application to execute arbitrary code within the
   1027 context of the kernel. This issue is rated as High because it first requires
   1028 compromising a privileged process.
   1029 </p>
   1030 
   1031 <table>
   1032   <col width="19%">
   1033   <col width="20%">
   1034   <col width="10%">
   1035   <col width="23%">
   1036   <col width="17%">
   1037   <tr>
   1038     <th>CVE</th>
   1039     <th>References</th>
   1040     <th>Severity</th>
   1041     <th>Updated Google devices</th>
   1042     <th>Date reported</th>
   1043   </tr>
   1044   <tr>
   1045     <td>CVE-2016-6778</td>
   1046     <td>A-31384646*</td>
   1047     <td>High</td>
   1048     <td>Nexus 9</td>
   1049     <td>Feb 25, 2016</td>
   1050   </tr>
   1051   <tr>
   1052     <td>CVE-2016-6779</td>
   1053     <td>A-31386004*</td>
   1054     <td>High</td>
   1055     <td>Nexus 9</td>
   1056     <td>Feb 25, 2016</td>
   1057   </tr>
   1058   <tr>
   1059     <td>CVE-2016-6780</td>
   1060     <td>A-31251496*</td>
   1061     <td>High</td>
   1062     <td>Nexus 9</td>
   1063     <td>Aug 30, 2016</td>
   1064   </tr>
   1065 </table>
   1066 <p>
   1067 * The patch for this issue is not publicly available. The update is contained in
   1068 the latest binary drivers for Google devices available from the <a
   1069 href="https://developers.google.com/android/nexus/drivers">Google Developer
   1070 site</a>.
   1071 </p>
   1072 
   1073 <h3 id="eop-in-mediatek-driver">Elevation of privilege vulnerability in
   1074 MediaTek driver</h3>
   1075 <p>
   1076 An elevation of privilege vulnerability in the MediaTek driver could enable a
   1077 local malicious application to execute arbitrary code within the context of the
   1078 kernel. This issue is rated as High because it first requires compromising a
   1079 privileged process.
   1080 </p>
   1081 
   1082 <table>
   1083   <col width="19%">
   1084   <col width="20%">
   1085   <col width="10%">
   1086   <col width="23%">
   1087   <col width="17%">
   1088   <tr>
   1089     <th>CVE</th>
   1090     <th>References</th>
   1091     <th>Severity</th>
   1092     <th>Updated Google devices</th>
   1093     <th>Date reported</th>
   1094   </tr>
   1095   <tr>
   1096     <td>CVE-2016-6492</td>
   1097     <td>A-28175122<br>MT-ALPS02696413</td>
   1098     <td>High</td>
   1099     <td>None*</td>
   1100     <td>Apr 11, 2016</td>
   1101   </tr>
   1102   <tr>
   1103     <td>CVE-2016-6781</td>
   1104     <td>A-31095175<br>MT-ALPS02943455</td>
   1105     <td>High</td>
   1106     <td>None*</td>
   1107     <td>Aug 22, 2016</td>
   1108   </tr>
   1109   <tr>
   1110     <td>CVE-2016-6782</td>
   1111     <td>A-31224389<br>MT-ALPS02943506</td>
   1112     <td>High</td>
   1113     <td>None*</td>
   1114     <td>Aug 24, 2016</td>
   1115   </tr>
   1116   <tr>
   1117     <td>CVE-2016-6783</td>
   1118     <td>A-31350044<br>MT-ALPS02943437</td>
   1119     <td>High</td>
   1120     <td>None*</td>
   1121     <td>Sep 6, 2016</td>
   1122   </tr>
   1123   <tr>
   1124     <td>CVE-2016-6784</td>
   1125     <td>A-31350755<br>MT-ALPS02961424</td>
   1126     <td>High</td>
   1127     <td>None*</td>
   1128     <td>Sep 6, 2016</td>
   1129   </tr>
   1130   <tr>
   1131     <td>CVE-2016-6785</td>
   1132     <td>A-31748056<br>MT-ALPS02961400</td>
   1133     <td>High</td>
   1134     <td>None*</td>
   1135     <td>Sep 25, 2016</td>
   1136   </tr>
   1137 </table>
   1138 <p>
   1139 * Supported Google devices on Android 7.0 or later that have installed all
   1140 available updates are not affected by this vulnerability.
   1141 </p>
   1142 
   1143 
   1144 <h3 id="eop-in-qualcomm-media-codecs">Elevation of privilege vulnerability in
   1145 Qualcomm media codecs</h3>
   1146 <p>
   1147 An elevation of privilege vulnerability in Qualcomm media codecs could enable a
   1148 local malicious application to execute arbitrary code within the context of a
   1149 privileged process. This issue is rated as High because it could be used to
   1150 gain local access to elevated capabilities, which are not normally accessible
   1151 to a third-party application.
   1152 </p>
   1153 
   1154 <table>
   1155   <col width="19%">
   1156   <col width="20%">
   1157   <col width="10%">
   1158   <col width="23%">
   1159   <col width="17%">
   1160   <tr>
   1161     <th>CVE</th>
   1162     <th>References</th>
   1163     <th>Severity</th>
   1164     <th>Updated Google devices</th>
   1165     <th>Date reported</th>
   1166   </tr>
   1167   <tr>
   1168     <td>CVE-2016-6761</td>
   1169     <td>A-29421682*
   1170     <br>QC-CR#1055792</td>
   1171     <td>High</td>
   1172     <td>Nexus 5X, Nexus 6, Nexus 6P, Nexus 9, Android One, Nexus Player, Pixel,
   1173 Pixel XL</td>
   1174     <td>Jun 16, 2016</td>
   1175   </tr>
   1176   <tr>
   1177     <td>CVE-2016-6760</td>
   1178     <td>A-29617572*
   1179     <br>QC-CR#1055783</td>
   1180     <td>High</td>
   1181     <td>Nexus 5X, Nexus 6, Nexus 6P, Nexus 9, Android One, Nexus Player, Pixel,
   1182 Pixel XL</td>
   1183     <td>Jun 23, 2016</td>
   1184   </tr>
   1185   <tr>
   1186     <td>CVE-2016-6759</td>
   1187     <td>A-29982686*
   1188     <br>QC-CR#1055766</td>
   1189     <td>High</td>
   1190     <td>Nexus 5X, Nexus 6, Nexus 6P, Nexus 9, Android One, Nexus Player, Pixel,
   1191 Pixel XL</td>
   1192     <td>Jul 4, 2016</td>
   1193   </tr>
   1194   <tr>
   1195     <td>CVE-2016-6758</td>
   1196     <td>A-30148882*
   1197     <br>QC-CR#1071731</td>
   1198     <td>High</td>
   1199     <td>Nexus 5X, Nexus 6, Nexus 6P, Nexus 9, Android One, Nexus Player, Pixel,
   1200 Pixel XL</td>
   1201     <td>Jul 13, 2016</td>
   1202   </tr>
   1203 </table>
   1204 <p>
   1205 * The patch for this issue is not publicly available. The update is contained in
   1206 the latest binary drivers for Google devices available from the <a
   1207 href="https://developers.google.com/android/nexus/drivers">Google Developer
   1208 site</a>.
   1209 </p>
   1210 
   1211 <h3 id="eop-in-qualcomm-camera-driver">Elevation of privilege vulnerability in
   1212 Qualcomm camera driver</h3>
   1213 <p>
   1214 An elevation of privilege vulnerability in the Qualcomm camera driver could
   1215 enable a local malicious application to execute arbitrary code within the
   1216 context of the kernel. This issue is rated as High because it first requires
   1217 compromising a privileged process.
   1218 </p>
   1219 
   1220 <table>
   1221   <col width="19%">
   1222   <col width="20%">
   1223   <col width="10%">
   1224   <col width="23%">
   1225   <col width="17%">
   1226   <tr>
   1227     <th>CVE</th>
   1228     <th>References</th>
   1229     <th>Severity</th>
   1230     <th>Updated Google devices</th>
   1231     <th>Date reported</th>
   1232   </tr>
   1233   <tr>
   1234     <td>CVE-2016-6755</td>
   1235     <td>A-30740545<br>
   1236         <a href="https://source.codeaurora.org/quic/la//kernel/msm-3.10/commit/?id=b5df02edbcdf53dbbab77903d28162772edcf6e0">
   1237 QC-CR#1065916</a></td>
   1238     <td>High</td>
   1239     <td>Nexus 5X, Nexus 6, Nexus 6P, Android One, Pixel, Pixel XL</td>
   1240     <td>Aug 3, 2016</td>
   1241   </tr>
   1242 </table>
   1243 
   1244 
   1245 <h3 id="eop-in-kernel-performance-subsystem">Elevation of privilege
   1246 vulnerability in kernel performance subsystem</h3>
   1247 <p>
   1248 An elevation of privilege vulnerability in the kernel performance subsystem
   1249 could enable a local malicious application to execute arbitrary code within the
   1250 context of the kernel. This issue is rated as High because it first requires
   1251 compromising a privileged process.
   1252 </p>
   1253 
   1254 <table>
   1255   <col width="19%">
   1256   <col width="20%">
   1257   <col width="10%">
   1258   <col width="23%">
   1259   <col width="17%">
   1260   <tr>
   1261     <th>CVE</th>
   1262     <th>References</th>
   1263     <th>Severity</th>
   1264     <th>Updated Google devices</th>
   1265     <th>Date reported</th>
   1266   </tr>
   1267   <tr>
   1268     <td>CVE-2016-6786</td>
   1269     <td>A-30955111
   1270        <a href="https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f63a8daa5812afef4f06c962351687e1ff9ccb2b">Upstream kernel</a></td>
   1271     <td>High</td>
   1272     <td>Nexus 5X, Nexus 6, Nexus 6P, Nexus 9, Android One, Pixel C, Nexus
   1273 Player, Pixel, Pixel XL</td>
   1274     <td>Aug 18, 2016</td>
   1275   </tr>
   1276   <tr>
   1277     <td>CVE-2016-6787</td>
   1278     <td>A-31095224
   1279        <a href="https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f63a8daa5812afef4f06c962351687e1ff9ccb2b">Upstream kernel</a></td>
   1280     <td>High</td>
   1281     <td>Nexus 5X, Nexus 6, Nexus 6P, Nexus 9, Android One, Pixel C, Nexus
   1282 Player, Pixel, Pixel XL</td>
   1283     <td>Aug 22, 2016</td>
   1284   </tr>
   1285 </table>
   1286 
   1287 
   1288 <h3 id="eop-in-mediatek-i2c-driver">Elevation of privilege vulnerability in
   1289 MediaTek I2C driver</h3>
   1290 <p>
   1291 An elevation of privilege vulnerability in the MediaTek I2C driver could enable
   1292 a local malicious application to execute arbitrary code within the context of
   1293 the kernel. This issue is rated as High because it first requires compromising
   1294 a privileged process.
   1295 </p>
   1296 
   1297 <table>
   1298   <col width="19%">
   1299   <col width="20%">
   1300   <col width="10%">
   1301   <col width="23%">
   1302   <col width="17%">
   1303   <tr>
   1304     <th>CVE</th>
   1305     <th>References</th>
   1306     <th>Severity</th>
   1307     <th>Updated Google devices</th>
   1308     <th>Date reported</th>
   1309   </tr>
   1310   <tr>
   1311     <td>CVE-2016-6788</td>
   1312     <td>A-31224428<br>MT-ALPS02943467</td>
   1313     <td>High</td>
   1314     <td>None*</td>
   1315     <td>Aug 24, 2016</td>
   1316   </tr>
   1317 </table>
   1318 <p>
   1319 * Supported Google devices on Android 7.0 or later that have installed all
   1320 available updates are not affected by this vulnerability.
   1321 </p>
   1322 
   1323 
   1324 <h3 id="eop-in-nvidia-libomx-library">Elevation of privilege vulnerability in
   1325 NVIDIA libomx library</h3>
   1326 <p>
   1327 An elevation of privilege vulnerability in the NVIDIA libomx library (libnvomx)
   1328 could enable a local malicious application to execute arbitrary code within the
   1329 context of a privileged process. This issue is rated as High because it could
   1330 be used to gain local access to elevated capabilities, which are not normally
   1331 accessible to a third-party application.
   1332 </p>
   1333 
   1334 <table>
   1335   <col width="19%">
   1336   <col width="20%">
   1337   <col width="10%">
   1338   <col width="23%">
   1339   <col width="17%">
   1340   <tr>
   1341     <th>CVE</th>
   1342     <th>References</th>
   1343     <th>Severity</th>
   1344     <th>Updated Google devices</th>
   1345     <th>Date reported</th>
   1346   </tr>
   1347   <tr>
   1348     <td>CVE-2016-6789</td>
   1349     <td>A-31251973*
   1350     <br>N-CVE-2016-6789</td>
   1351     <td>High</td>
   1352     <td>Pixel C</td>
   1353     <td>Aug 29, 2016</td>
   1354   </tr>
   1355   <tr>
   1356     <td>CVE-2016-6790</td>
   1357     <td>A-31251628*
   1358     <br>N-CVE-2016-6790</td>
   1359     <td>High</td>
   1360     <td>Pixel C</td>
   1361     <td>Aug 28, 2016</td>
   1362   </tr>
   1363 </table>
   1364 <p>
   1365 * The patch for this issue is not publicly available. The update is contained in
   1366 the latest binary drivers for Google devices available from the <a
   1367 href="https://developers.google.com/android/nexus/drivers">Google Developer
   1368 site</a>.
   1369 </p>
   1370 
   1371 <h3 id="eop-in-qualcomm-sound-driver">Elevation of privilege vulnerability in
   1372 Qualcomm sound driver</h3>
   1373 <p>
   1374 An elevation of privilege vulnerability in the Qualcomm sound driver could
   1375 enable a local malicious application to execute arbitrary code within the
   1376 context of the kernel. This issue is rated as High because it first requires
   1377 compromising a privileged process.
   1378 </p>
   1379 
   1380 <table>
   1381   <col width="19%">
   1382   <col width="20%">
   1383   <col width="10%">
   1384   <col width="23%">
   1385   <col width="17%">
   1386   <tr>
   1387     <th>CVE</th>
   1388     <th>References</th>
   1389     <th>Severity</th>
   1390     <th>Updated Google devices</th>
   1391     <th>Date reported</th>
   1392   </tr>
   1393   <tr>
   1394     <td>CVE-2016-6791</td>
   1395     <td>A-31252384<br>
   1396         <a href="https://source.codeaurora.org/quic/la/kernel/msm-3.10/commit/?id=62580295210b6c0bd809cde7088b45ebb65ace79">
   1397 QC-CR#1071809</a></td>
   1398     <td>High</td>
   1399     <td>Nexus 5X, Nexus 6, Nexus 6P, Android One, Pixel, Pixel XL</td>
   1400     <td>Aug 31, 2016</td>
   1401   </tr>
   1402   <tr>
   1403     <td>CVE-2016-8391</td>
   1404     <td>A-31253255<br>
   1405         <a href="https://source.codeaurora.org/quic/la/kernel/msm-3.10/commit/?id=62580295210b6c0bd809cde7088b45ebb65ace79">
   1406 QC-CR#1072166</a></td>
   1407     <td>High</td>
   1408     <td>Nexus 5X, Nexus 6, Nexus 6P, Android One, Pixel, Pixel XL</td>
   1409     <td>Aug 31, 2016</td>
   1410   </tr>
   1411   <tr>
   1412     <td>CVE-2016-8392</td>
   1413     <td>A-31385862<br>
   1414         <a href="https://source.codeaurora.org/quic/la/kernel/msm-3.10/commit/?id=62580295210b6c0bd809cde7088b45ebb65ace79">
   1415 QC-CR#1073136</a></td>
   1416     <td>High</td>
   1417     <td>Nexus 5X, Nexus 6, Nexus 6P, Android One, Pixel, Pixel XL</td>
   1418     <td>Sep 8, 2016</td>
   1419   </tr>
   1420 </table>
   1421 
   1422 
   1423 <h3 id="eop-in-kernel-security-subsystem">Elevation of privilege vulnerability
   1424 in kernel security subsystem</h3>
   1425 <p>
   1426 An elevation of privilege vulnerability in the kernel security subsystem could
   1427 enable a local malicious application to execute arbitrary code within the
   1428 context of the kernel. This issue is rated as High because it first requires
   1429 compromising a privileged process.
   1430 </p>
   1431 
   1432 <table>
   1433   <col width="19%">
   1434   <col width="20%">
   1435   <col width="10%">
   1436   <col width="23%">
   1437   <col width="17%">
   1438   <tr>
   1439     <th>CVE</th>
   1440     <th>References</th>
   1441     <th>Severity</th>
   1442     <th>Updated Google devices</th>
   1443     <th>Date reported</th>
   1444   </tr>
   1445   <tr>
   1446     <td>CVE-2015-7872</td>
   1447     <td>A-31253168<br>
   1448         <a href="http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f05819df10d7b09f6d1eb6f8534a8f68e5a4fe61">
   1449 Upstream kernel</a></td>
   1450     <td>High</td>
   1451     <td>Nexus 5X, Nexus 6, Nexus 6P, Nexus 9, Android One, Nexus Player, Pixel,
   1452 Pixel XL</td>
   1453     <td>Aug 31, 2016</td>
   1454   </tr>
   1455 </table>
   1456 
   1457 
   1458 <h3 id="eop-in-synaptics-touchscreen-driver">Elevation of privilege
   1459 vulnerability in Synaptics touchscreen driver</h3>
   1460 <p>
   1461 An elevation of privilege vulnerability in the Synaptics touchscreen driver
   1462 could enable a local malicious application to execute arbitrary code within the
   1463 context of the kernel. This issue is rated as High because it first requires
   1464 compromising a privileged process.
   1465 </p>
   1466 
   1467 <table>
   1468   <col width="19%">
   1469   <col width="20%">
   1470   <col width="10%">
   1471   <col width="23%">
   1472   <col width="17%">
   1473   <tr>
   1474     <th>CVE</th>
   1475     <th>References</th>
   1476     <th>Severity</th>
   1477     <th>Updated Google devices</th>
   1478     <th>Date reported</th>
   1479   </tr>
   1480   <tr>
   1481     <td>CVE-2016-8393</td>
   1482     <td>A-31911920*</td>
   1483     <td>High</td>
   1484     <td>Nexus 5X, Nexus 6P, Nexus 9, Android One, Pixel, Pixel XL</td>
   1485     <td>Sep 8, 2016</td>
   1486   </tr>
   1487   <tr>
   1488     <td>CVE-2016-8394</td>
   1489     <td>A-31913197*</td>
   1490     <td>High</td>
   1491     <td>Nexus 9, Android One</td>
   1492     <td>Sep 8, 2016</td>
   1493   </tr>
   1494 </table>
   1495 <p>
   1496 * The patch for this issue is not publicly available. The update is contained in
   1497 the latest binary drivers for Google devices available from the <a
   1498 href="https://developers.google.com/android/nexus/drivers">Google Developer
   1499 site</a>.
   1500 </p>
   1501 
   1502 <h3 id="eop-in-broadcom-wi-fi-driver">Elevation of privilege vulnerability in
   1503 Broadcom Wi-Fi driver</h3>
   1504 <p>
   1505 An elevation of privilege vulnerability in the Broadcom Wi-Fi driver could
   1506 enable a local malicious application to execute arbitrary code within the
   1507 context of the kernel. This issue is rated as High because it first requires
   1508 compromising a privileged process.
   1509 </p>
   1510 
   1511 <table>
   1512   <col width="19%">
   1513   <col width="20%">
   1514   <col width="10%">
   1515   <col width="23%">
   1516   <col width="17%">
   1517   <tr>
   1518     <th>CVE</th>
   1519     <th>References</th>
   1520     <th>Severity</th>
   1521     <th>Updated Google devices</th>
   1522     <th>Date reported</th>
   1523   </tr>
   1524   <tr>
   1525     <td>CVE-2014-9909</td>
   1526     <td>A-31676542<br>B-RB#26684</td>
   1527     <td>High</td>
   1528     <td>None*</td>
   1529     <td>Sep 21, 2016</td>
   1530   </tr>
   1531   <tr>
   1532     <td>CVE-2014-9910</td>
   1533     <td>A-31746399<br>B-RB#26710</td>
   1534     <td>High</td>
   1535     <td>None*</td>
   1536     <td>Sep 26, 2016</td>
   1537   </tr>
   1538 </table>
   1539 <p>
   1540 * Supported Google devices on Android 7.0 or later that have installed all
   1541 available updates are not affected by this vulnerability.
   1542 </p>
   1543 
   1544 
   1545 <h3 id="id-in-mediatek-video-driver">Information disclosure vulnerability in
   1546 MediaTek video driver</h3>
   1547 <p>
   1548 An information disclosure vulnerability in the MediaTek video driver could
   1549 enable a local malicious application to access data outside of its permission
   1550 levels. This issue is rated as High because it could be used to access
   1551 sensitive data without explicit user permission.
   1552 </p>
   1553 
   1554 <table>
   1555   <col width="19%">
   1556   <col width="20%">
   1557   <col width="10%">
   1558   <col width="23%">
   1559   <col width="17%">
   1560   <tr>
   1561     <th>CVE</th>
   1562     <th>References</th>
   1563     <th>Severity</th>
   1564     <th>Updated Google devices</th>
   1565     <th>Date reported</th>
   1566   </tr>
   1567   <tr>
   1568     <td>CVE-2016-8396</td>
   1569     <td>A-31249105</td>
   1570     <td>High</td>
   1571     <td>None*</td>
   1572     <td>Aug 26, 2016</td>
   1573   </tr>
   1574 </table>
   1575 <p>
   1576 * Supported Google devices on Android 7.0 or later that have installed all
   1577 available updates are not affected by this vulnerability.
   1578 </p>
   1579 
   1580 
   1581 <h3 id="id-in-nvidia-video-driver">Information disclosure vulnerability in
   1582 NVIDIA video driver</h3>
   1583 <p>
   1584 An information disclosure vulnerability in the NVIDIA video driver could enable
   1585 a local malicious application to access data outside of its permission levels.
   1586 This issue is rated as High because it could be used to access sensitive data
   1587 without explicit user permission.
   1588 </p>
   1589 
   1590 <table>
   1591   <col width="19%">
   1592   <col width="20%">
   1593   <col width="10%">
   1594   <col width="23%">
   1595   <col width="17%">
   1596   <tr>
   1597     <th>CVE</th>
   1598     <th>References</th>
   1599     <th>Severity</th>
   1600     <th>Updated Google devices</th>
   1601     <th>Date reported</th>
   1602   </tr>
   1603   <tr>
   1604     <td>CVE-2016-8397</td>
   1605     <td>A-31385953*<br>
   1606     N-CVE-2016-8397</td>
   1607     <td>High</td>
   1608     <td>Nexus 9</td>
   1609     <td>Sep 8, 2016</td>
   1610   </tr>
   1611 </table>
   1612 <p>
   1613 * The patch for this issue is not publicly available. The update is contained in
   1614 the latest binary drivers for Google devices available from the <a
   1615 href="https://developers.google.com/android/nexus/drivers">Google Developer
   1616 site</a>.
   1617 </p>
   1618 
   1619 <h3 id="dos-in-gps">Denial of service vulnerability in GPS</h3>
   1620 <p>
   1621 A denial of service vulnerability in the Qualcomm GPS component could enable a
   1622 remote attacker to cause a device hang or reboot. This issue is rated as High
   1623 due to the possibility of a temporary remote denial of service.
   1624 </p>
   1625 
   1626 <table>
   1627   <col width="19%">
   1628   <col width="20%">
   1629   <col width="10%">
   1630   <col width="23%">
   1631   <col width="17%">
   1632   <tr>
   1633     <th>CVE</th>
   1634     <th>References</th>
   1635     <th>Severity</th>
   1636     <th>Updated Google devices</th>
   1637     <th>Date reported</th>
   1638   </tr>
   1639   <tr>
   1640     <td>CVE-2016-5341</td>
   1641     <td>A-31470303*</td>
   1642     <td>High</td>
   1643     <td>Nexus 6, Nexus 5X, Nexus 6P, Nexus 9, Android One, Pixel,
   1644 Pixel XL</td>
   1645     <td>Jun 21, 2016</td>
   1646   </tr>
   1647 </table>
   1648 <p>
   1649 * The patch for this issue is not publicly available. The update is contained in
   1650 the latest binary drivers for Google devices available from the <a
   1651 href="https://developers.google.com/android/nexus/drivers">Google Developer
   1652 site</a>.
   1653 </p>
   1654 
   1655 <h3 id="dos-in-nvidia-camera-driver">Denial of service vulnerability in NVIDIA
   1656 camera driver</h3>
   1657 <p>
   1658 A denial of service vulnerability in the NVIDIA camera driver could enable an
   1659 attacker to cause a local permanent denial of service, which may require
   1660 reflashing the operating system to repair the device. This issue is rated as
   1661 High due to the possibility of local permanent denial of service.
   1662 </p>
   1663 
   1664 <table>
   1665   <col width="19%">
   1666   <col width="20%">
   1667   <col width="10%">
   1668   <col width="23%">
   1669   <col width="17%">
   1670   <tr>
   1671     <th>CVE</th>
   1672     <th>References</th>
   1673     <th>Severity</th>
   1674     <th>Updated Google devices</th>
   1675     <th>Date reported</th>
   1676   </tr>
   1677   <tr>
   1678     <td>CVE-2016-8395</td>
   1679     <td>A-31403040*
   1680     <br>N-CVE-2016-8395</td>
   1681     <td>High</td>
   1682     <td>Pixel C</td>
   1683     <td>Sep 9, 2016</td>
   1684   </tr>
   1685 </table>
   1686 <p>
   1687 * The patch for this issue is not publicly available. The update is contained in
   1688 the latest binary drivers for Google devices available from the <a
   1689 href="https://developers.google.com/android/nexus/drivers">Google Developer
   1690 site</a>.
   1691 </p>
   1692 
   1693 <h3 id="eop-in-kernel-networking-subsystem">Elevation of privilege
   1694 vulnerability in kernel networking subsystem</h3>
   1695 <p>
   1696 An elevation of privilege vulnerability in the kernel networking subsystem
   1697 could enable a local malicious application to execute arbitrary code within the
   1698 context of the kernel. This issue is rated as Moderate because it first
   1699 requires compromising a privileged process and current compiler optimizations
   1700 restrict access to the vulnerable code.
   1701 </p>
   1702 
   1703 <table>
   1704   <col width="19%">
   1705   <col width="20%">
   1706   <col width="10%">
   1707   <col width="23%">
   1708   <col width="17%">
   1709   <tr>
   1710     <th>CVE</th>
   1711     <th>References</th>
   1712     <th>Severity</th>
   1713     <th>Updated Google devices</th>
   1714     <th>Date reported</th>
   1715   </tr>
   1716   <tr>
   1717     <td>CVE-2016-8399</td>
   1718     <td>A-31349935*</td>
   1719     <td>Moderate</td>
   1720     <td>Nexus 5X, Nexus 6, Nexus 6P, Nexus 9, Android One, Pixel C, Nexus
   1721 Player, Pixel, Pixel XL</td>
   1722     <td>Sep 5, 2016</td>
   1723   </tr>
   1724 </table>
   1725 <p>
   1726 * The patch for this issue is not publicly available. The update is contained in
   1727 the latest binary drivers for Google devices available from the <a
   1728 href="https://developers.google.com/android/nexus/drivers">Google Developer
   1729 site</a>.
   1730 </p>
   1731 
   1732 <h3 id="id-in-qualcomm-components">Information disclosure vulnerability in
   1733 Qualcomm components</h3>
   1734 <p>
   1735 An information disclosure vulnerability in Qualcomm components including the
   1736 camera driver and video driver could enable a local malicious application to
   1737 access data outside of its permission levels. This issue is rated as Moderate
   1738 because it first requires compromising a privileged process.
   1739 </p>
   1740 
   1741 <table>
   1742   <col width="19%">
   1743   <col width="20%">
   1744   <col width="10%">
   1745   <col width="23%">
   1746   <col width="17%">
   1747   <tr>
   1748     <th>CVE</th>
   1749     <th>References</th>
   1750     <th>Severity</th>
   1751     <th>Updated Google devices</th>
   1752     <th>Date reported</th>
   1753   </tr>
   1754   <tr>
   1755     <td>CVE-2016-6756</td>
   1756     <td>A-29464815<br>
   1757         <a href="https://source.codeaurora.org/quic/la//kernel/msm-3.10/commit/?id=f91d28dcba304c9f3af35b5bebaa26233c8c13a5">
   1758         QC-CR#1042068</a>
   1759        [<a href="https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=3a214ef870dc97437c7de79a1507dfe5079dce88">2</a>]</td>
   1760     <td>Moderate</td>
   1761     <td>Nexus 5X, Nexus 6, Nexus 6P, Android One, Pixel, Pixel XL</td>
   1762     <td>Jun 17, 2016</td>
   1763   </tr>
   1764   <tr>
   1765     <td>CVE-2016-6757</td>
   1766     <td>A-30148242<br>
   1767         <a href="https://source.codeaurora.org/quic/la/kernel/msm-3.10/commit/?id=cd99d3bbdb16899a425716e672485e0cdc283245">
   1768 QC-CR#1052821</a></td>
   1769     <td>Moderate</td>
   1770     <td>Nexus 5X, Nexus 6, Nexus 6P, Pixel, Pixel XL</td>
   1771     <td>Jul 13, 2016</td>
   1772   </tr>
   1773 </table>
   1774 
   1775 
   1776 <h3 id="id-in-nvidia-librm-library">Information disclosure vulnerability in
   1777 NVIDIA librm library</h3>
   1778 <p>
   1779 An information disclosure vulnerability in the NVIDIA librm library (libnvrm)
   1780 could enable a local malicious application to access data outside of its
   1781 permission levels. This issue is rated as Moderate because it could be used to
   1782 access sensitive data without permission.
   1783 </p>
   1784 
   1785 <table>
   1786   <col width="19%">
   1787   <col width="20%">
   1788   <col width="10%">
   1789   <col width="23%">
   1790   <col width="17%">
   1791   <tr>
   1792     <th>CVE</th>
   1793     <th>References</th>
   1794     <th>Severity</th>
   1795     <th>Updated Google devices</th>
   1796     <th>Date reported</th>
   1797   </tr>
   1798   <tr>
   1799     <td>CVE-2016-8400</td>
   1800     <td>A-31251599*
   1801     <br>N-CVE-2016-8400</td>
   1802     <td>Moderate</td>
   1803     <td>Pixel C</td>
   1804     <td>Aug 29, 2016</td>
   1805   </tr>
   1806 </table>
   1807 <p>
   1808 * The patch for this issue is not publicly available. The update is contained in
   1809 the latest binary drivers for Google devices available from the <a
   1810 href="https://developers.google.com/android/nexus/drivers">Google Developer
   1811 site</a>.
   1812 </p>
   1813 
   1814 <h3 id="id-in-kernel-components">Information disclosure vulnerability in kernel
   1815 components</h3>
   1816 <p>
   1817 An information disclosure vulnerability in kernel components including the ION
   1818 subsystem, Binder, USB driver and networking subsystem could enable a local
   1819 malicious application to access data outside of its permission levels. This
   1820 issue is rated as Moderate because it first requires compromising a privileged
   1821 process.
   1822 </p>
   1823 
   1824 <table>
   1825   <col width="19%">
   1826   <col width="20%">
   1827   <col width="10%">
   1828   <col width="23%">
   1829   <col width="17%">
   1830   <tr>
   1831     <th>CVE</th>
   1832     <th>References</th>
   1833     <th>Severity</th>
   1834     <th>Updated Google devices</th>
   1835     <th>Date reported</th>
   1836   </tr>
   1837   <tr>
   1838     <td>CVE-2016-8401</td>
   1839     <td>A-31494725*</td>
   1840     <td>Moderate</td>
   1841     <td>Nexus 5X, Nexus 6, Nexus 6P, Nexus 9, Android One, Pixel C, Nexus
   1842 Player, Pixel, Pixel XL</td>
   1843     <td>Sep 13, 2016</td>
   1844   </tr>
   1845   <tr>
   1846     <td>CVE-2016-8402</td>
   1847     <td>A-31495231*</td>
   1848     <td>Moderate</td>
   1849     <td>Nexus 5X, Nexus 6, Nexus 6P, Nexus 9, Android One, Pixel C, Nexus
   1850 Player, Pixel, Pixel XL</td>
   1851     <td>Sep 13, 2016</td>
   1852   </tr>
   1853   <tr>
   1854     <td>CVE-2016-8403</td>
   1855     <td>A-31495348*</td>
   1856     <td>Moderate</td>
   1857     <td>Nexus 9</td>
   1858     <td>Sep 13, 2016</td>
   1859   </tr>
   1860   <tr>
   1861     <td>CVE-2016-8404</td>
   1862     <td>A-31496950*</td>
   1863     <td>Moderate</td>
   1864     <td>Nexus 9</td>
   1865     <td>Sep 13, 2016</td>
   1866   </tr>
   1867   <tr>
   1868     <td>CVE-2016-8405</td>
   1869     <td>A-31651010*</td>
   1870     <td>Moderate</td>
   1871     <td>Nexus 5X, Nexus 6, Nexus 6P, Nexus 9, Android One, Pixel C, Nexus
   1872 Player, Pixel, Pixel XL</td>
   1873     <td>Sep 21, 2016</td>
   1874   </tr>
   1875   <tr>
   1876     <td>CVE-2016-8406</td>
   1877     <td>A-31796940*</td>
   1878     <td>Moderate</td>
   1879     <td>Nexus 5X, Nexus 6, Nexus 6P, Nexus 9, Android One, Pixel C, Nexus
   1880 Player, Pixel, Pixel XL</td>
   1881     <td>Sep 27, 2016</td>
   1882   </tr>
   1883   <tr>
   1884     <td>CVE-2016-8407</td>
   1885     <td>A-31802656*</td>
   1886     <td>Moderate</td>
   1887     <td>Nexus 5X, Nexus 6, Nexus 6P, Android One, Pixel, Pixel XL</td>
   1888     <td>Sep 28, 2016</td>
   1889   </tr>
   1890 </table>
   1891 <p>
   1892 * The patch for this issue is not publicly available. The update is contained in
   1893 the latest binary drivers for Google devices available from the <a
   1894 href="https://developers.google.com/android/nexus/drivers">Google Developer
   1895 site</a>.
   1896 </p>
   1897 
   1898 <h3 id="id-in-nvidia-video-driver-2">Information disclosure vulnerability in
   1899 NVIDIA video driver</h3>
   1900 <p>
   1901 An information disclosure vulnerability in the NVIDIA video driver could enable
   1902 a local malicious application to access data outside of its permission levels.
   1903 This issue is rated as Moderate because it first requires compromising a
   1904 privileged process.
   1905 </p>
   1906 
   1907 <table>
   1908   <col width="19%">
   1909   <col width="20%">
   1910   <col width="10%">
   1911   <col width="23%">
   1912   <col width="17%">
   1913   <tr>
   1914     <th>CVE</th>
   1915     <th>References</th>
   1916     <th>Severity</th>
   1917     <th>Updated Google devices</th>
   1918     <th>Date reported</th>
   1919   </tr>
   1920   <tr>
   1921     <td>CVE-2016-8408</td>
   1922     <td>A-31496571*
   1923     <br>N-CVE-2016-8408</td>
   1924     <td>Moderate</td>
   1925     <td>Nexus 9</td>
   1926     <td>Sep 13, 2016</td>
   1927   </tr>
   1928   <tr>
   1929     <td>CVE-2016-8409</td>
   1930     <td>A-31495687*
   1931     <br>N-CVE-2016-8409</td>
   1932     <td>Moderate</td>
   1933     <td>Nexus 9</td>
   1934     <td>Sep 13, 2016</td>
   1935   </tr>
   1936 </table>
   1937 <p>
   1938 * The patch for this issue is not publicly available. The update is contained in
   1939 the latest binary drivers for Google devices available from the <a
   1940 href="https://developers.google.com/android/nexus/drivers">Google Developer
   1941 site</a>.
   1942 </p>
   1943 
   1944 <h3 id="id-in-qualcomm-sound-driver">Information disclosure vulnerability in
   1945 Qualcomm sound driver</h3>
   1946 <p>
   1947 An information disclosure vulnerability in the Qualcomm sound driver could
   1948 enable a local malicious application to access data outside of its permission
   1949 levels. This issue is rated as Moderate because it first requires compromising
   1950 a privileged process.
   1951 </p>
   1952 
   1953 <table>
   1954   <col width="19%">
   1955   <col width="20%">
   1956   <col width="10%">
   1957   <col width="23%">
   1958   <col width="17%">
   1959   <tr>
   1960     <th>CVE</th>
   1961     <th>References</th>
   1962     <th>Severity</th>
   1963     <th>Updated Google devices</th>
   1964     <th>Date reported</th>
   1965   </tr>
   1966   <tr>
   1967     <td>CVE-2016-8410</td>
   1968     <td>A-31498403<br>
   1969         <a href="https://source.codeaurora.org/quic/la//kernel/msm-3.10/commit/?h=e2bbf665187a1f0a1248e4a088823cb182153ba9">
   1970 QC-CR#987010</a></td>
   1971     <td>Moderate</td>
   1972     <td>Nexus 5X, Nexus 6, Nexus 6P, Android One</td>
   1973     <td>Google internal</td>
   1974   </tr>
   1975 </table>
   1976 
   1977 <h2 id="common-questions-and-answers">Common Questions and Answers</h2>
   1978 <p>
   1979 This section answers common questions that may occur after reading this
   1980 bulletin.
   1981 </p>
   1982 <p>
   1983 <strong>1. How do I determine if my device is updated to address these issues?
   1984 </strong>
   1985 </p>
   1986 <p>
   1987 To learn how to check a device's security patch level, read the instructions on
   1988 the  <a
   1989 href="https://support.google.com/pixelphone/answer/4457705#pixel_phones&nexus_devices">Pixel
   1990 and Nexus update schedule</a>.
   1991 </p>
   1992 <ul>
   1993   <li>Security patch levels of 2016-12-01 or later address all issues associated
   1994   with the 2016-12-01 security patch level.</li>
   1995   <li>Security patch levels of 2016-12-05 or later address all issues associated
   1996   with the 2016-12-05 security patch level and all previous patch levels.</li>
   1997 </ul>
   1998 <p>
   1999 Device manufacturers that include these updates should set the patch string
   2000 level to:
   2001 </p>
   2002 <ul>
   2003   <li>[ro.build.version.security_patch]:[2016-12-01]</li>
   2004   <li>[ro.build.version.security_patch]:[2016-12-05]</li>
   2005 </ul>
   2006 <p>
   2007 <strong>2. Why does this bulletin have two security patch levels?</strong>
   2008 </p>
   2009 <p>
   2010 This bulletin has two security patch levels so that Android partners have the
   2011 flexibility to fix a subset of vulnerabilities that are similar across all
   2012 Android devices more quickly. Android partners are encouraged to fix all issues
   2013 in this bulletin and use the latest security patch level.
   2014 </p>
   2015 <ul>
   2016   <li>Devices that use the December 1, 2016 security patch level must include all
   2017   issues associated with that security patch level, as well as fixes for all
   2018   issues reported in previous security bulletins.</li>
   2019   <li>Devices that use the security patch level of December 5, 2016 or newer must
   2020   include all applicable patches in this (and previous) security
   2021   bulletins.</li>
   2022 </ul>
   2023 <p>
   2024 Partners are encouraged to bundle the fixes for all issues they are addressing
   2025 in a single update.
   2026 </p>
   2027 <p>
   2028 <strong>3. How do I determine which Google devices are affected by each
   2029 issue?</strong>
   2030 </p>
   2031 <p>
   2032 In the <a
   2033 href="#2016-12-01-details">2016-12-01</a> and
   2034 <a href="#2016-12-05-details">2016-12-05</a>
   2035 security vulnerability details sections, each table has an <em>Updated Google
   2036 devices</em> column that covers the range of affected Google devices updated for
   2037 each issue. This column has a few options:
   2038 </p>
   2039 <ul>
   2040   <li><strong>All Google devices</strong>: If an issue affects All and Pixel
   2041   devices, the table will have "All" in the <em>Updated Google devices</em>
   2042   column. "All" encapsulates the following <a
   2043   href="https://support.google.com/pixelphone/answer/4457705#pixel_phones&nexus_devices">supported
   2044   devices</a>: Nexus 5, Nexus 5X, Nexus 6, Nexus 6P, Nexus 9,
   2045   Android One, Nexus Player, Pixel C, Pixel, and Pixel XL.</li>
   2046   <li><strong>Some Google devices</strong>: If an issue doesn't affect all Google
   2047   devices, the affected Google devices are listed in the <em>Updated Google
   2048   devices</em> column.</li>
   2049   <li><strong>No Google devices</strong>: If no Google devices running Android 7.0
   2050   are affected by the issue, the table will have "None" in the <em>Updated Google
   2051   devices</em> column.</li>
   2052 </ul>
   2053 <p>
   2054 <strong>4. What do the entries in the references column map to?</strong>
   2055 </p>
   2056 <p>
   2057 Entries under the <em>References</em> column of the vulnerability details table
   2058 may contain a prefix identifying the organization to which the reference value
   2059 belongs. These prefixes map as follows:
   2060 </p>
   2061 <table>
   2062   <tr>
   2063    <th>Prefix</th>
   2064    <th>Reference</th>
   2065   </tr>
   2066   <tr>
   2067    <td>A-</td>
   2068    <td>Android bug ID</td>
   2069   </tr>
   2070   <tr>
   2071    <td>QC-</td>
   2072    <td>Qualcomm reference number</td>
   2073   </tr>
   2074   <tr>
   2075    <td>M-</td>
   2076    <td>MediaTek reference number</td>
   2077   </tr>
   2078   <tr>
   2079    <td>N-</td>
   2080    <td>NVIDIA reference number</td>
   2081   </tr>
   2082   <tr>
   2083    <td>B-</td>
   2084    <td>Broadcom reference number</td>
   2085   </tr>
   2086 </table>
   2087 <h2 id="revisions">Revisions</h2>
   2088 <ul>
   2089   <li>December 05, 2016: Bulletin published.</li>
   2090   <li>December 07, 2016: Bulletin revised to include AOSP links and updated
   2091       attribution for CVE-2016-6915, CVE-2016-6916 and CVE-2016-6917.</li>
   2092   <li>December 21, 2016: Corrected typos in CVE-2016-8411 description and
   2093       Common Questions and Answers.</li>
   2094 </ul>
   2095 
   2096   </body>
   2097 </html>
   2098