Home | History | Annotate | Download | only in bulletin
      1 <html devsite>
      2   <head>
      3     <title>Android Security BulletinApril 2017</title>
      4     <meta name="project_path" value="/_project.yaml" />
      5     <meta name="book_path" value="/_book.yaml" />
      6   </head>
      7   <body>
      8   <!--
      9       Copyright 2017 The Android Open Source Project
     10 
     11       Licensed under the Apache License, Version 2.0 (the "License");
     12       you may not use this file except in compliance with the License.
     13       You may obtain a copy of the License at
     14 
     15           http://www.apache.org/licenses/LICENSE-2.0
     16 
     17       Unless required by applicable law or agreed to in writing, software
     18       distributed under the License is distributed on an "AS IS" BASIS,
     19       WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
     20       See the License for the specific language governing permissions and
     21       limitations under the License.
     22   -->
     23 <p><em>Published April 03, 2017 | Updated April 27, 2017</em></p>
     24 <p>The Android Security Bulletin contains details of security vulnerabilities
     25 affecting Android devices. Alongside the bulletin, we have released a security
     26 update to Nexus devices through an over-the-air (OTA) update. The Google device
     27 firmware images have also been released to the <a
     28 href="https://developers.google.com/android/nexus/images">Google Developer
     29 site</a>. Security patch levels of April 05, 2017 or later address all of these
     30 issues. Refer to the <a
     31 href="https://support.google.com/pixelphone/answer/4457705#pixel_phones&nexus_devices">Pixel
     32 and Nexus update schedule</a> to learn how to check a device's security patch
     33 level.</p>
     34 <p>Partners were notified of the issues described in the bulletin on March 06, 2017
     35 or earlier. Source code patches for these issues have been released to the Android
     36 Open Source Project (AOSP) repository and linked from this bulletin. This bulletin
     37 also includes links to patches outside of AOSP.</p>
     38 <p>The most severe of these issues is a Critical security vulnerability that could
     39 enable remote code execution on an affected device through multiple methods such
     40 as email, web browsing, and MMS when processing media files. The
     41 <a href="/security/overview/updates-resources.html#severity">severity
     42 assessment</a> is based on the effect that exploiting the vulnerability would
     43 possibly have on an affected device, assuming the platform and service
     44 mitigations are disabled for development purposes or if successfully bypassed.</p>
     45 <p>We have had no reports of active customer exploitation or abuse of these newly
     46 reported issues. Refer to the <a href="#mitigations">Android and Google service
     47 mitigations</a> section for details on the <a
     48 href="/security/enhancements/index.html">Android
     49 security platform protections</a> and service protections such as <a
     50 href="https://developer.android.com/training/safetynet/index.html">SafetyNet</a>,
     51 which improve the security of the Android platform.</p>
     52 <p>We encourage all customers to accept these updates to their devices.</p>
     53 
     54 <h2 id="announcements">Announcements</h2>
     55 <ul>
     56 <li>This bulletin has two security patch level strings to provide Android
     57 partners with the flexibility to more quickly fix a subset of vulnerabilities
     58 that are similar across all Android devices. See <a
     59 href="#common-questions-and-answers">Common questions and answers</a> for
     60 additional information:
     61  <ul>
     62    <li><strong>2017-04-01</strong>: Partial security patch level string. This
     63   security patch level string indicates that all issues associated with 2017-04-01
     64   (and all previous security patch level strings) are addressed.</li>
     65    <li><strong>2017-04-05</strong>: Complete security patch level string. This
     66   security patch level string indicates that all issues associated with 2017-04-01
     67   and 2017-04-05 (and all previous security patch level strings) are addressed.</li>
     68  </ul>
     69 </li>
     70 <li>Supported Google devices will receive a single OTA update with the April 05,
     71 2017 security patch level.</li>
     72 </ul>
     73 
     74 <h2 id="mitigations">Android and Google Service Mitigations</h2>
     75 <p>This is a summary of the mitigations provided by the <a
     76 href="/security/enhancements/index.html">Android
     77 security platform</a> and service protections such as SafetyNet. These
     78 capabilities reduce the likelihood that security vulnerabilities could be
     79 successfully exploited on Android.</p>
     80 <ul>
     81   <li>Exploitation for many issues on Android is made more difficult by
     82   enhancements in newer versions of the Android platform. We encourage all users
     83   to update to the latest version of Android where possible.</li>
     84   <li>The Android Security team actively monitors for abuse with <a
     85   href="http://static.googleusercontent.com/media/source.android.com/en//security/reports/Google_Android_Security_2016_Report_Final.pdf">Verify
     86   Apps and SafetyNet</a>, which are designed to warn users about <a
     87   href="http://static.googleusercontent.com/media/source.android.com/en//security/reports/Google_Android_Security_PHA_classifications.pdf">Potentially
     88   Harmful Applications</a>. Verify Apps is enabled by default on devices with <a
     89   href="http://www.android.com/gms">Google Mobile Services</a> and is especially
     90   important for users who install applications from outside of Google Play. Device
     91   rooting tools are prohibited within Google Play, but Verify Apps warns users
     92   when they attempt to install a detected rooting applicationno matter where it
     93   comes from. Additionally, Verify Apps attempts to identify and block
     94   installation of known malicious applications that exploit a privilege escalation
     95   vulnerability. If such an application has already been installed, Verify Apps
     96   will notify the user and attempt to remove the detected application.</li>
     97   <li>As appropriate, Google Hangouts and Messenger applications do not
     98   automatically pass media to processes such as Mediaserver.</li>
     99 </ul>
    100 
    101 <h2 id="acknowledgements">Acknowledgements</h2>
    102 <p>We would like to thank these researchers for their contributions:</p>
    103 <ul>
    104   <li>Aravind Machiry (donfos) of Shellphish Grill Team: CVE-2016-5349</li>
    105   <li>Daxing Guo (<a href="https://twitter.com/freener0">@freener0</a>) of Xuanwu
    106   Lab, Tencent: CVE-2017-0585, CVE-2017-0553</li>
    107   <li><a href="mailto:derrek.haxx (a] gmail.com">Derrek</a> (<a
    108   href="https://twitter.com/derrekr6">@derrekr6</a>) and Scott Bauer:
    109   CVE-2017-0576</li>
    110   <li>Gal Beniamini of Project Zero: CVE-2017-0571, CVE-2017-0570, CVE-2017-0572,
    111   CVE-2017-0569, CVE-2017-0561</li>
    112   <li>Gengjia Chen (<a href="https://twitter.com/chengjia4574">@chengjia4574</a>)
    113   and <a href="http://weibo.com/jfpan">pjf </a>of IceSword Lab, Qihoo 360
    114   Technology Co. Ltd.: CVE-2017-6426, CVE-2017-0581, CVE-2017-0329, CVE-2017-0332,
    115   CVE-2017-0566, CVE-2017-0573</li>
    116   <li>Guang Gong () (<a href="https://twitter.com/oldfresher">@oldfresher</a>)
    117   of Alpha Team, Qihoo 360 Technology Co. Ltd.: CVE-2017-0547</li>
    118   <li>Hao Chen and Guang Gong of Alpha Team, Qihoo 360 Technology Co. Ltd.:
    119   CVE-2017-6424, CVE-2017-0584, CVE-2017-0454, CVE-2017-0574, CVE-2017-0575, CVE-2017-0567</li>
    120   <li>Ian Foster (<a href="https://twitter.com/lanrat">@lanrat</a>): CVE-2017-0554</li>
    121   <li>Jack Tang of Trend Micro Inc.: CVE-2017-0579</li>
    122   <li>Jianjun Dai (<a href="https://twitter.com/Jioun_dai">@Jioun_dai</a>) of <a
    123   href="https://skyeye.360safe.com">Qihoo 360 Skyeye Labs</a>: CVE-2017-0559,
    124   CVE-2017-0541</li>
    125   <li>Jianqiang Zhao (<a
    126   href="https://twitter.com/jianqiangzhao">@jianqiangzhao</a>) and <a
    127   href="http://weibo.com/jfpan">pjf</a> of IceSword Lab, Qihoo 360: CVE-2017-6425,
    128   CVE-2016-5346</li>
    129   <li>Lubo Zhang (<a href="mailto:zlbzlb815 (a] 163.com">zlbzlb815 (a] 163.com</a>) of
    130   <a href="http://c0reteam.org">C0RE Team</a> and Yonggang Guo
    131   (<a href="https://twitter.com/guoygang">@guoygang</a>) of IceSword Lab, Qihoo
    132   360 Technology Co. Ltd.: CVE-2017-0564</li>
    133   <li><a href="mailto:salyzyn (a] android.com">Mark Salyzyn</a> of Google:
    134   CVE-2017-0558</li>
    135   <li>Mike Anderson (<a href="https://twitter.com/manderbot">@manderbot</a>) and
    136   Nathan Crandall (<a href="https://twitter.com/natecray">@natecray</a>) of
    137   Tesla's Product Security Team: CVE-2017-0327, CVE-2017-0328</li>
    138   <li>Peng Xiao, Chengming Yang, Ning You, Chao Yang, and Yang song of Alibaba
    139   Mobile Security Group: CVE-2017-0565</li>
    140   <li>Pengfei Ding (), Chenfu Bao (), and Lenx Wei () of Baidu X-Lab
    141   (): CVE-2016-10236</li>
    142   <li>Qidan He ( - <a href="https://twitter.com/flanker_hqd">@flanker_hqd</a>)
    143   of KeenLab, Tencent: CVE-2017-0544, CVE-2017-0325</li>
    144   <li>Roee Hay (<a href="https://twitter.com/roeehay">@roeehay</a>) of Aleph
    145   Research, HCL Technologies: CVE-2017-0582, CVE-2017-0563</li>
    146   <li><a href="mailto:sbauer (a] plzdonthack.me">Scott Bauer</a> (<a
    147   href="https://twitter.com/ScottyBauer1">@ScottyBauer1</a>): CVE-2017-0562,
    148   CVE-2017-0339</li>
    149   <li>Seven Shen (<a href="https://twitter.com/lingtongshen">@lingtongshen</a>) of
    150   TrendMicro Mobile Threat Research Team: CVE-2016-10231, CVE-2017-0578, CVE-2017-0586</li>
    151   <li>Tim Becker: CVE-2017-0546</li>
    152   <li>Uma Sankar Pradhan (<a
    153   href="https://twitter.com/umasankar_iitd">@umasankar_iitd</a>): CVE-2017-0560</li>
    154   <li>V.E.O (<a href="https://twitter.com/vysea">@VYSEa</a>) of <a
    155   href="http://blog.trendmicro.com/trendlabs-security-intelligence/category/mobile">Mobile
    156   Threat Response Team</a>, <a href="http://www.trendmicro.com">Trend Micro</a>:
    157   CVE-2017-0555, CVE-2017-0538, CVE-2017-0539, CVE-2017-0557,
    158   CVE-2017-0556</li>
    159   <li>Weichao Sun (<a href="https://twitter.com/sunblate">@sunblate</a>) of
    160   Alibaba Inc: CVE-2017-0549</li>
    161   <li>Wenlin Yang (<a href="https://twitter.com/wenlin_yang">@wenlin_yang</a>),
    162   Guang Gong (<a href="https://twitter.com/oldfresher">@oldfresher</a>), and Hao
    163   Chen of Alpha Team, Qihoo 360 Technology Co. Ltd.: CVE-2017-0580, CVE-2017-0577</li>
    164   <li><a href="http://weibo.com/ele7enxxh">Zinuo Han</a> from Chengdu Security
    165   Response Center of Qihoo 360 Technology Co. Ltd.: CVE-2017-0548</li>
    166   <li>Zubin Mithra of Google: CVE-2017-0462</li>
    167 </ul>
    168 
    169 <h2 id="2017-04-01-details">2017-04-01 security patch levelVulnerability
    170 details</h2>
    171 <p>In the sections below, we provide details for each of the security
    172 vulnerabilities that apply to the 2017-04-01 patch level.There is a description
    173 of the issue, a severity rationale, and a table with the CVE, associated
    174 references, severity, updated Google devices, updated AOSP versions (where
    175 applicable), and date reported. When available, we will link the public change
    176 that addressed the issue to the bug ID, like the AOSP change list. When multiple
    177 changes relate to a single bug, additional references are linked to numbers
    178 following the bug ID.</p>
    179 
    180 
    181 <h3 id="rce-in-mediaserver">Remote code execution vulnerability in
    182 Mediaserver</h3>
    183 <p>A remote code execution vulnerability in Mediaserver could enable an attacker
    184 using a specially crafted file to cause memory corruption during media file and
    185 data processing. This issue is rated as Critical due to the possibility of
    186 remote code execution within the context of the Mediaserver process.</p>
    187 
    188 <table>
    189   <col width="18%">
    190   <col width="17%">
    191   <col width="10%">
    192   <col width="19%">
    193   <col width="18%">
    194   <col width="17%">
    195   <tr>
    196     <th>CVE</th>
    197     <th>References</th>
    198     <th>Severity</th>
    199     <th>Updated Google devices</th>
    200     <th>Updated AOSP versions</th>
    201     <th>Date reported</th>
    202   </tr>
    203   <tr>
    204     <td>CVE-2017-0538</td>
    205     <td><a href="https://android.googlesource.com/platform/external/libavc/+/494561291a503840f385fbcd11d9bc5f4dc502b8">A-33641588</a></td>
    206     <td>Critical</td>
    207     <td>All</td>
    208     <td>6.0, 6.0.1, 7.0, 7.1.1</td>
    209     <td>Dec 13, 2016</td>
    210   </tr>
    211   <tr>
    212     <td>CVE-2017-0539</td>
    213     <td><a href="https://android.googlesource.com/platform/external/libhevc/+/1ab5ce7e42feccd49e49752e6f58f9097ac5d254">A-33864300</a></td>
    214     <td>Critical</td>
    215     <td>All</td>
    216     <td>5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1</td>
    217     <td>Dec 23, 2016</td>
    218   </tr>
    219   <tr>
    220     <td>CVE-2017-0541</td>
    221     <td><a href="https://android.googlesource.com/platform/external/sonivox/+/56d153259cc3e16a6a0014199a2317dde333c978">A-34031018</a></td>
    222     <td>Critical</td>
    223     <td>All</td>
    224     <td>4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1</td>
    225     <td>Jan 1, 2017</td>
    226   </tr>
    227   <tr>
    228     <td>CVE-2017-0542</td>
    229     <td><a href="https://android.googlesource.com/platform/external/libavc/+/33ef7de9ddc8ea7eb9cbc440d1cf89957a0c267b">A-33934721</a></td>
    230     <td>Critical</td>
    231     <td>All</td>
    232     <td>6.0, 6.0.1, 7.0, 7.1.1</td>
    233     <td>Google internal</td>
    234   </tr>
    235   <tr>
    236     <td>CVE-2017-0543</td>
    237     <td><a href="https://android.googlesource.com/platform/external/libavc/+/f634481e940421020e52f511c1fb34aac1db4b2f">A-34097866</a></td>
    238     <td>Critical</td>
    239     <td>All</td>
    240     <td>6.0, 6.0.1, 7.0, 7.1.1</td>
    241     <td>Google internal</td>
    242   </tr>
    243 </table>
    244 
    245 
    246 <h3 id="eop-in-camerabase">Elevation of privilege vulnerability in
    247 CameraBase</h3>
    248 <p>An elevation of privilege vulnerability in CameraBase could enable a local
    249 malicious application to execute arbitrary code. This issue is rated as High
    250 because it is a local arbitrary code execution in a privileged process.</p>
    251 
    252 <table>
    253   <col width="18%">
    254   <col width="17%">
    255   <col width="10%">
    256   <col width="19%">
    257   <col width="18%">
    258   <col width="17%">
    259   <tr>
    260     <th>CVE</th>
    261     <th>References</th>
    262     <th>Severity</th>
    263     <th>Updated Google devices</th>
    264     <th>Updated AOSP versions</th>
    265     <th>Date reported</th>
    266   </tr>
    267   <tr>
    268     <td>CVE-2017-0544</td>
    269     <td><a href="https://android.googlesource.com/platform/frameworks/av/+/4b49489c12e6862e9a320ebcb53872e809ed20ec">A-31992879</a></td>
    270     <td>High</td>
    271     <td>All</td>
    272     <td>4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1</td>
    273     <td>Oct 6, 2016</td>
    274   </tr>
    275 </table>
    276 
    277 
    278 <h3 id="eop-in-audioserver">Elevation of privilege vulnerability in
    279 Audioserver</h3>
    280 <p>An elevation of privilege vulnerability in Audioserver could enable a local
    281 malicious application to execute arbitrary code within the context of a
    282 privileged process. This issue is rated as High because it could be used to
    283 gain local access to elevated capabilities, which are not normally accessible
    284 to a third-party application.</p>
    285 
    286 <table>
    287   <col width="18%">
    288   <col width="17%">
    289   <col width="10%">
    290   <col width="19%">
    291   <col width="18%">
    292   <col width="17%">
    293   <tr>
    294     <th>CVE</th>
    295     <th>References</th>
    296     <th>Severity</th>
    297     <th>Updated Google devices</th>
    298     <th>Updated AOSP versions</th>
    299     <th>Date reported</th>
    300   </tr>
    301   <tr>
    302     <td>CVE-2017-0545</td>
    303     <td><a href="https://android.googlesource.com/platform/frameworks/av/+/e5a54485e08400a976092cd5b1c6d909d0e1a4ab">A-32591350</a></td>
    304     <td>High</td>
    305     <td>All</td>
    306     <td>5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1</td>
    307     <td>Oct 31, 2016</td>
    308   </tr>
    309 </table>
    310 
    311 
    312 <h3 id="eop-in-surfaceflinger">Elevation of privilege vulnerability in
    313 SurfaceFlinger</h3>
    314 <p>An elevation of privilege vulnerability in SurfaceFlinger could enable a local
    315 malicious application to execute arbitrary code within the context of a
    316 privileged process. This issue is rated as High because it could be used to
    317 gain local access to elevated capabilities, which are not normally accessible
    318 to a third-party application.</p>
    319 
    320 <table>
    321   <col width="18%">
    322   <col width="17%">
    323   <col width="10%">
    324   <col width="19%">
    325   <col width="18%">
    326   <col width="17%">
    327   <tr>
    328     <th>CVE</th>
    329     <th>References</th>
    330     <th>Severity</th>
    331     <th>Updated Google devices</th>
    332     <th>Updated AOSP versions</th>
    333     <th>Date reported</th>
    334   </tr>
    335   <tr>
    336     <td>CVE-2017-0546</td>
    337     <td><a href="https://android.googlesource.com/platform/frameworks/native/+/45b202513ba7440beaefbf9928f73fb6683dcfbd">A-32628763</a></td>
    338     <td>High</td>
    339     <td>All</td>
    340     <td>4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1</td>
    341     <td>Nov 2, 2016</td>
    342   </tr>
    343 </table>
    344 
    345 
    346 <h3 id="id-in-mediaserver">Information disclosure vulnerability in
    347 Mediaserver</h3>
    348 <p>An information disclosure vulnerability in Mediaserver could enable a local
    349 malicious application to access data outside of its permission levels. This
    350 issue is rated as High because it is a general bypass for operating system
    351 protections that isolate application data from other applications.</p>
    352 
    353 <table>
    354   <col width="18%">
    355   <col width="17%">
    356   <col width="10%">
    357   <col width="19%">
    358   <col width="18%">
    359   <col width="17%">
    360   <tr>
    361     <th>CVE</th>
    362     <th>References</th>
    363     <th>Severity</th>
    364     <th>Updated Google devices</th>
    365     <th>Updated AOSP versions</th>
    366     <th>Date reported</th>
    367   </tr>
    368   <tr>
    369     <td>CVE-2017-0547</td>
    370     <td><a href="https://android.googlesource.com/platform/frameworks/av/+/9667e3eff2d34c3797c3b529370de47b2c1f1bf6">A-33861560</a></td>
    371     <td>High</td>
    372     <td>All</td>
    373     <td>4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1</td>
    374     <td>Dec 22, 2016</td>
    375   </tr>
    376 </table>
    377 
    378 
    379 <h3 id="dos-in-libskia">Denial of service vulnerability in libskia</h3>
    380 <p>A remote denial of service vulnerability in libskia could enable an attacker to
    381 use a specially crafted file to cause a device hang or reboot. This issue is
    382 rated as High severity due to the possibility of remote denial of service.</p>
    383 
    384 <table>
    385   <col width="18%">
    386   <col width="17%">
    387   <col width="10%">
    388   <col width="19%">
    389   <col width="18%">
    390   <col width="17%">
    391   <tr>
    392     <th>CVE</th>
    393     <th>References</th>
    394     <th>Severity</th>
    395     <th>Updated Google devices</th>
    396     <th>Updated AOSP versions</th>
    397     <th>Date reported</th>
    398   </tr>
    399   <tr>
    400     <td>CVE-2017-0548</td>
    401     <td><a href="https://android.googlesource.com/platform/external/skia/+/318e3505ac2436c62ec19fd27ebe9f8e7d174544">A-33251605</a></td>
    402     <td>High</td>
    403     <td>All</td>
    404     <td>7.0, 7.1.1</td>
    405     <td>Nov 29, 2016</td>
    406   </tr>
    407 </table>
    408 
    409 
    410 <h3 id="dos-in-mediaserver">Denial of service vulnerability in Mediaserver</h3>
    411 <p>A remote denial of service vulnerability in Mediaserver could enable an
    412 attacker to use a specially crafted file to cause a device hang or reboot. This
    413 issue is rated as High severity due to the possibility of remote denial of
    414 service.</p>
    415 
    416 <table>
    417   <col width="18%">
    418   <col width="17%">
    419   <col width="10%">
    420   <col width="19%">
    421   <col width="18%">
    422   <col width="17%">
    423   <tr>
    424     <th>CVE</th>
    425     <th>References</th>
    426     <th>Severity</th>
    427     <th>Updated Google devices</th>
    428     <th>Updated AOSP versions</th>
    429     <th>Date reported</th>
    430   </tr>
    431   <tr>
    432     <td>CVE-2017-0549</td>
    433     <td><a href="https://android.googlesource.com/platform/external/libavc/+/37345554fea84afd446d6d8fbb87feea5a0dde3f">A-33818508</a></td>
    434     <td>High</td>
    435     <td>All</td>
    436     <td>6.0, 6.0.1, 7.0, 7.1.1</td>
    437     <td>Dec 20, 2016</td>
    438   </tr>
    439   <tr>
    440     <td>CVE-2017-0550</td>
    441     <td><a href="https://android.googlesource.com/platform/external/libavc/+/7950bf47b6944546a0aff11a7184947de9591b51">A-33933140</a></td>
    442     <td>High</td>
    443     <td>All</td>
    444     <td>6.0, 6.0.1, 7.0, 7.1.1</td>
    445     <td>Google internal</td>
    446   </tr>
    447   <tr>
    448     <td>CVE-2017-0551</td>
    449     <td><a href="https://android.googlesource.com/platform/external/libavc/+/8b5fd8f24eba5dd19ab2f80ea11a9125aa882ae2">A-34097231</a>
    450     [<a href="https://android.googlesource.com/platform/external/libavc/+/494561291a503840f385fbcd11d9bc5f4dc502b8">2</a>]</td>
    451     <td>High</td>
    452     <td>All</td>
    453     <td>6.0, 6.0.1, 7.0, 7.1.1</td>
    454     <td>Google internal</td>
    455   </tr>
    456   <tr>
    457     <td>CVE-2017-0552</td>
    458     <td><a href="https://android.googlesource.com/platform/external/libavc/+/9a00f562a612d56e7b2b989d168647db900ba6cf">A-34097915</a></td>
    459     <td>High</td>
    460     <td>All</td>
    461     <td>6.0, 6.0.1, 7.0, 7.1.1</td>
    462     <td>Google internal</td>
    463   </tr>
    464 </table>
    465 
    466 
    467 <h3 id="eop-in-libnl">Elevation of privilege vulnerability in libnl</h3>
    468 <p>An elevation of privilege vulnerability in libnl could enable a local malicious
    469 application to execute arbitrary code within the context of the Wi-Fi service.
    470 This issue is rated as Moderate because it first requires compromising a
    471 privileged process and is mitigated by current platform configurations.</p>
    472 
    473 <table>
    474   <col width="18%">
    475   <col width="17%">
    476   <col width="10%">
    477   <col width="19%">
    478   <col width="18%">
    479   <col width="17%">
    480   <tr>
    481     <th>CVE</th>
    482     <th>References</th>
    483     <th>Severity</th>
    484     <th>Updated Google devices</th>
    485     <th>Updated AOSP versions</th>
    486     <th>Date reported</th>
    487   </tr>
    488   <tr>
    489     <td>CVE-2017-0553</td>
    490     <td><a href="https://android.googlesource.com/platform/external/libnl/+/f83d9c1c67b6be69a96995e384f50b572b667df0">A-32342065</a></td>
    491     <td>Moderate</td>
    492     <td>All</td>
    493     <td>5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1</td>
    494     <td>Oct 21, 2016</td>
    495   </tr>
    496 </table>
    497 
    498 
    499 <h3 id="eop-in-telephony">Elevation of privilege vulnerability in
    500 Telephony</h3>
    501 <p>An elevation of privilege vulnerability in the Telephony component could enable
    502 a local malicious application to access capabilities outside of its permission
    503 levels. This issue is rated as Moderate because it could be used to gain access
    504 to elevated capabilities, which are not normally accessible to a third-party
    505 application.</p>
    506 
    507 <table>
    508   <col width="18%">
    509   <col width="17%">
    510   <col width="10%">
    511   <col width="19%">
    512   <col width="18%">
    513   <col width="17%">
    514   <tr>
    515     <th>CVE</th>
    516     <th>References</th>
    517     <th>Severity</th>
    518     <th>Updated Google devices</th>
    519     <th>Updated AOSP versions</th>
    520     <th>Date reported</th>
    521   </tr>
    522   <tr>
    523     <td>CVE-2017-0554</td>
    524     <td><a href="https://android.googlesource.com/platform/packages/services/Telephony/+/aeb795ef2290af1a0e4b14909363bc574e6b3ee7">A-33815946</a>
    525     [<a href="https://android.googlesource.com/platform/frameworks/base/+/3294256ba5b9e2ba2d8619d617e3d900e5386564">2</a>]</td>
    526     <td>Moderate</td>
    527     <td>All</td>
    528     <td>4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1</td>
    529     <td>Dec 20, 2016</td>
    530   </tr>
    531 </table>
    532 
    533 
    534 <h3 id="id-in-mediaserver-2">Information disclosure vulnerability in
    535 Mediaserver</h3>
    536 <p>An information disclosure vulnerability in Mediaserver could enable a local
    537 malicious application to access data outside of its permission levels. This
    538 issue is rated as Moderate because it could be used to access data without
    539 permission.</p>
    540 
    541 <table>
    542   <col width="18%">
    543   <col width="17%">
    544   <col width="10%">
    545   <col width="19%">
    546   <col width="18%">
    547   <col width="17%">
    548   <tr>
    549     <th>CVE</th>
    550     <th>References</th>
    551     <th>Severity</th>
    552     <th>Updated Google devices</th>
    553     <th>Updated AOSP versions</th>
    554     <th>Date reported</th>
    555   </tr>
    556   <tr>
    557     <td>CVE-2017-0555</td>
    558     <td><a href="https://android.googlesource.com/platform/external/libavc/+/0b23c81c3dd9ec38f7e6806a3955fed1925541a0">A-33551775</a></td>
    559     <td>Moderate</td>
    560     <td>All</td>
    561     <td>6.0, 6.0.1, 7.0, 7.1.1</td>
    562     <td>Dec 12, 2016</td>
    563   </tr>
    564   <tr>
    565     <td>CVE-2017-0556</td>
    566     <td><a href="https://android.googlesource.com/platform/external/libmpeg2/+/f301cff2c1ddd880d9a2c77b22602a137519867b">A-34093952</a></td>
    567     <td>Moderate</td>
    568     <td>All</td>
    569     <td>6.0, 6.0.1, 7.0, 7.1.1</td>
    570     <td>Jan 4, 2017</td>
    571   </tr>
    572   <tr>
    573     <td>CVE-2017-0557</td>
    574     <td><a href="https://android.googlesource.com/platform/external/libmpeg2/+/227c1f829127405e21dab1664393050c652ef71e">A-34093073</a></td>
    575     <td>Moderate</td>
    576     <td>All</td>
    577     <td>6.0, 6.0.1, 7.0, 7.1.1</td>
    578     <td>Jan 4, 2017</td>
    579   </tr>
    580   <tr>
    581     <td>CVE-2017-0558</td>
    582     <td><a href="https://android.googlesource.com/platform/frameworks/av/+/50358a80b1724f6cf1bcdf003e1abf9cc141b122">A-34056274</a></td>
    583     <td>Moderate</td>
    584     <td>All</td>
    585     <td>4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1</td>
    586     <td>Google internal</td>
    587   </tr>
    588 </table>
    589 
    590 
    591 <h3 id="id-in-libskia">Information disclosure vulnerability in libskia</h3>
    592 <p>An information disclosure vulnerability in libskia could enable a local
    593 malicious application to access data outside of its permission levels. This
    594 issue is rated as Moderate because it could be used to access data without
    595 permission.</p>
    596 
    597 <table>
    598   <col width="18%">
    599   <col width="17%">
    600   <col width="10%">
    601   <col width="19%">
    602   <col width="18%">
    603   <col width="17%">
    604   <tr>
    605     <th>CVE</th>
    606     <th>References</th>
    607     <th>Severity</th>
    608     <th>Updated Google devices</th>
    609     <th>Updated AOSP versions</th>
    610     <th>Date reported</th>
    611   </tr>
    612   <tr>
    613     <td>CVE-2017-0559</td>
    614     <td><a href="https://android.googlesource.com/platform/external/skia/+/16882f721279a82a1c860ac689ce570b16fe26a0">A-33897722</a></td>
    615     <td>Moderate</td>
    616     <td>All</td>
    617     <td>4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1</td>
    618     <td>Dec 25, 2016</td>
    619   </tr>
    620 </table>
    621 
    622 
    623 <h3 id="id-in-factory-reset">Information disclosure vulnerability in Factory
    624 Reset</h3>
    625 <p>An information disclosure vulnerability in the factory reset process could
    626 enable a local malicious attacker to access data from the previous owner. This
    627 issue is rated as Moderate due to the possibility of bypassing device
    628 protection.</p>
    629 
    630 <table>
    631   <col width="18%">
    632   <col width="17%">
    633   <col width="10%">
    634   <col width="19%">
    635   <col width="18%">
    636   <col width="17%">
    637   <tr>
    638     <th>CVE</th>
    639     <th>References</th>
    640     <th>Severity</th>
    641     <th>Updated Google devices</th>
    642     <th>Updated AOSP versions</th>
    643     <th>Date reported</th>
    644   </tr>
    645   <tr>
    646     <td>CVE-2017-0560</td>
    647     <td><a href="https://android.googlesource.com/platform/frameworks/base/+/efdec8f5688ce6b0a287eddb6d5dad93ffa0e1ee">A-30681079</a></td>
    648     <td>Moderate</td>
    649     <td>All</td>
    650     <td>4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1</td>
    651     <td>Google internal</td>
    652   </tr>
    653 </table>
    654 
    655 <h2 id="2017-04-05-details">2017-04-05 security patch levelVulnerability
    656 details</h2>
    657 <p>In the sections below, we provide details for each of the security
    658 vulnerabilities that apply to the 2017-04-05 patch level. There is a description
    659 of the issue, a severity rationale, and a table with the CVE, associated
    660 references, severity, updated Google devices, updated AOSP versions (where
    661 applicable), and date reported. When available, we will link the public change
    662 that addressed the issue to the bug ID, like the AOSP change list. When multiple
    663 changes relate to a single bug, additional references are linked to numbers
    664 following the bug ID.</p>
    665 
    666 
    667 <h3 id="rce-in-broadcom-wi-fi-firmware">Remote code execution vulnerability in
    668 Broadcom Wi-Fi firmware</h3>
    669 <p>A remote code execution vulnerability in the Broadcom Wi-Fi firmware could
    670 enable a remote attacker to execute arbitrary code within the context of the
    671 Wi-Fi SoC. This issue is rated as Critical due to the possibility of remote
    672 code execution in the context of the Wi-Fi SoC.</p>
    673 
    674 <table>
    675   <col width="19%">
    676   <col width="20%">
    677   <col width="10%">
    678   <col width="23%">
    679   <col width="17%">
    680   <tr>
    681     <th>CVE</th>
    682     <th>References</th>
    683     <th>Severity</th>
    684     <th>Updated Google devices</th>
    685     <th>Date reported</th>
    686   </tr>
    687   <tr>
    688     <td>CVE-2017-0561</td>
    689     <td>A-34199105*<br>
    690         B-RB#110814</td>
    691     <td>Critical</td>
    692     <td>Nexus 6, Nexus 6P, Nexus 9, Pixel C, Nexus Player</td>
    693     <td>Jan 9, 2017</td>
    694   </tr>
    695 </table>
    696 <p>* The patch for this issue is not publicly available. The update is contained
    697 in the latest binary drivers for Nexus devices available from the
    698 <a href="https://developers.google.com/android/nexus/drivers">
    699 Google Developer site</a>.</p>
    700 
    701 
    702 <h3 id="rce-in-qualcomm-crypto-engine-driver">Remote code execution
    703 vulnerability in Qualcomm crypto engine driver</h3>
    704 <p>A remote code execution vulnerability in the Qualcomm crypto engine driver
    705 could enable a remote attacker to execute arbitrary code within the context of
    706 the kernel. This issue is rated as Critical due to the possibility of remote
    707 code execution in the context of the kernel.</p>
    708 
    709 <table>
    710   <col width="19%">
    711   <col width="20%">
    712   <col width="10%">
    713   <col width="23%">
    714   <col width="17%">
    715   <tr>
    716     <th>CVE</th>
    717     <th>References</th>
    718     <th>Severity</th>
    719     <th>Updated Google devices</th>
    720     <th>Date reported</th>
    721   </tr>
    722   <tr>
    723     <td>CVE-2016-10230</td>
    724     <td>A-34389927<br>
    725         <a 
    726 href="https://source.codeaurora.org/quic/la//kernel/msm-3.18/commit/?id=bd9a8fc6d7f6bd1a0b936994630006de450df657">
    727 QC-CR#1091408</a></td>
    728     <td>Critical</td>
    729     <td>Nexus 5X, Nexus 6, Nexus 6P, Pixel, Pixel XL, Android One</td>
    730     <td>Jan 10, 2017</td>
    731   </tr>
    732 </table>
    733 
    734 
    735 <h3 id="rce-in-kernel-networking-subsystem">Remote code execution vulnerability
    736 in kernel networking subsystem</h3>
    737 <p>A remote code execution vulnerability in the kernel networking subsystem could
    738 enable a remote attacker to execute arbitrary code within the context of the
    739 kernel. This issue is rated as Critical due to the possibility of remote code
    740 execution in the context of the kernel.</p>
    741 
    742 <table>
    743   <col width="19%">
    744   <col width="20%">
    745   <col width="10%">
    746   <col width="23%">
    747   <col width="17%">
    748   <tr>
    749     <th>CVE</th>
    750     <th>References</th>
    751     <th>Severity</th>
    752     <th>Updated Google devices</th>
    753     <th>Date reported</th>
    754   </tr>
    755   <tr>
    756     <td>CVE-2016-10229</td>
    757     <td>A-32813456<br>
    758         <a 
    759 href="http://git.kernel.org/cgit/linux/kernel/git/stable/linux-stable.git/commit/?id=197c949e7798fbf28cfadc69d9ca0c2abbf93191">
    760 Upstream kernel</a></td>
    761     <td>Critical</td>
    762     <td>Nexus 5X, Nexus 6, Nexus 6P, Pixel, Pixel XL, Pixel C, Android One,
    763 Nexus Player</td>
    764     <td>Google internal</td>
    765   </tr>
    766 </table>
    767 
    768 
    769 <h3 id="eop-in-mediatek-touchscreen-driver">Elevation of privilege
    770 vulnerability in MediaTek touchscreen driver</h3>
    771 <p>An elevation of privilege vulnerability in the MediaTek touchscreen driver
    772 could enable a local malicious application to execute arbitrary code within the
    773 context of the kernel. This issue is rated as Critical due to the possibility
    774 of a local permanent device compromise, which may require reflashing the
    775 operating system to repair the device.</p>
    776 
    777 <table>
    778   <col width="19%">
    779   <col width="20%">
    780   <col width="10%">
    781   <col width="23%">
    782   <col width="17%">
    783   <tr>
    784     <th>CVE</th>
    785     <th>References</th>
    786     <th>Severity</th>
    787     <th>Updated Google devices</th>
    788     <th>Date reported</th>
    789   </tr>
    790   <tr>
    791     <td>CVE-2017-0562</td>
    792     <td>A-30202425*<br>
    793         M-ALPS02898189</td>
    794     <td>Critical*</td>
    795     <td>None**</td>
    796     <td>Jul 16, 2016</td>
    797   </tr>
    798 </table>
    799 <p>* The patch for this issue is not publicly available. The update is contained
    800 in the latest binary drivers for Nexus devices available from the
    801 <a href="https://developers.google.com/android/nexus/drivers">
    802 Google Developer site</a>.</p>
    803 <p>** Supported Google devices on Android 7.0 or later that have installed all
    804 available updates are not affected by this vulnerability.</p>
    805 
    806 
    807 <h3 id="eop-in-htc-touchscreen-driver">Elevation of privilege vulnerability in
    808 HTC touchscreen driver</h3>
    809 <p>An elevation of privilege vulnerability in the HTC touchscreen driver could
    810 enable a local malicious application to execute arbitrary code within the
    811 context of the kernel. This issue is rated as Critical due to the possibility
    812 of a local permanent device compromise, which may require reflashing the
    813 operating system to repair the device.</p>
    814 
    815 <table>
    816   <col width="19%">
    817   <col width="20%">
    818   <col width="10%">
    819   <col width="23%">
    820   <col width="17%">
    821   <tr>
    822     <th>CVE</th>
    823     <th>References</th>
    824     <th>Severity</th>
    825     <th>Updated Google devices</th>
    826     <th>Date reported</th>
    827   </tr>
    828   <tr>
    829     <td>CVE-2017-0563</td>
    830     <td>A-32089409*<br>
    831         </td>
    832     <td>Critical</td>
    833     <td>Nexus 9</td>
    834     <td>Oct 9, 2016</td>
    835   </tr>
    836 </table>
    837 <p>* The patch for this issue is not publicly available. The update is contained
    838 in the latest binary drivers for Nexus devices available from the
    839 <a href="https://developers.google.com/android/nexus/drivers">
    840 Google Developer site</a>.</p>
    841 
    842 
    843 <h3 id="eop-in-kernel-ion-subsystem">Elevation of privilege vulnerability in
    844 kernel ION subsystem</h3>
    845 <p>An elevation of privilege vulnerability in the kernel ION subsystem could
    846 enable a local malicious application to execute arbitrary code within the
    847 context of the kernel. This issue is rated as Critical due to the possibility
    848 of a local permanent device compromise, which may require reflashing the
    849 operating system to repair the device.</p>
    850 
    851 <table>
    852   <col width="19%">
    853   <col width="20%">
    854   <col width="10%">
    855   <col width="23%">
    856   <col width="17%">
    857   <tr>
    858     <th>CVE</th>
    859     <th>References</th>
    860     <th>Severity</th>
    861     <th>Updated Google devices</th>
    862     <th>Date reported</th>
    863   </tr>
    864   <tr>
    865     <td>CVE-2017-0564</td>
    866     <td>A-34276203*<br>
    867         </td>
    868     <td>Critical</td>
    869     <td>Nexus 5X, Nexus 6, Nexus 6P, Pixel, Pixel XL, Pixel C, Android One,
    870 Nexus Player</td>
    871     <td>Jan 12, 2017</td>
    872   </tr>
    873 </table>
    874 <p>* The patch for this issue is not publicly available. The update is contained
    875 in the latest binary drivers for Nexus devices available from the
    876 <a href="https://developers.google.com/android/nexus/drivers">
    877 Google Developer site</a>.</p>
    878 
    879 
    880 <h3 id="vulnerabilities-in-qualcomm-components">Vulnerabilities in Qualcomm
    881 components</h3>
    882 <p>These vulnerabilities affect Qualcomm components and are described in further
    883 detail in the Qualcomm AMSS October 2016 security bulletin.</p>
    884 
    885 <table>
    886   <col width="19%">
    887   <col width="20%">
    888   <col width="10%">
    889   <col width="23%">
    890   <col width="17%">
    891   <tr>
    892     <th>CVE</th>
    893     <th>References</th>
    894     <th>Severity</th>
    895     <th>Updated Google devices</th>
    896     <th>Date reported</th>
    897   </tr>
    898   <tr>
    899     <td>CVE-2016-10237</td>
    900     <td>A-31628601**<br>
    901         QC-CR#1046751</td>
    902     <td>Critical</td>
    903     <td>None**</td>
    904     <td>Qualcomm internal</td>
    905   </tr>
    906   <tr>
    907     <td>CVE-2016-10238</td>
    908     <td>A-35358527**<br>
    909         QC-CR#1042558</td>
    910     <td>Critical</td>
    911     <td>None***</td>
    912     <td>Qualcomm internal</td>
    913   </tr>
    914   <tr>
    915     <td>CVE-2016-10239</td>
    916     <td>A-31624618**<br>
    917         QC-CR#1032929</td>
    918     <td>High</td>
    919     <td>Pixel, Pixel XL</td>
    920     <td>Qualcomm internal</td>
    921   </tr>
    922 </table>
    923 <p>* The severity rating for these vulnerabilities was determined by the vendor.</p>
    924 <p>* The patch for this issue is not publicly available. The update is contained
    925 in the latest binary drivers for Nexus devices available from the
    926 <a href="https://developers.google.com/android/nexus/drivers">
    927 Google Developer site</a>.</p>
    928 <p>*** Supported Google devices on Android 7.0 or later that have installed all
    929 available updates are not affected by this vulnerability.</p>
    930 
    931 
    932 <h3 id="rce-in-v8">Remote code execution vulnerability in v8</h3>
    933 <p>A remote code execution vulnerability in v8 could enable remote attackers to
    934 execute arbitrary code within the context of a privileged process. This issue
    935 is rated as High due to the possibility of remote code execution in websites. </p>
    936 
    937 <table>
    938   <col width="18%">
    939   <col width="17%">
    940   <col width="10%">
    941   <col width="19%">
    942   <col width="18%">
    943   <col width="17%">
    944   <tr>
    945     <th>CVE</th>
    946     <th>References</th>
    947     <th>Severity</th>
    948     <th>Updated Google devices</th>
    949     <th>Updated AOSP versions</th>
    950     <th>Date reported</th>
    951   </tr>
    952   <tr>
    953     <td>CVE-2016-5129</td>
    954     <td>A-29178923</td>
    955     <td>High</td>
    956     <td>None*</td>
    957     <td>6.0, 6.0.1, 7.0</td>
    958     <td>Jul 20, 2016</td>
    959   </tr>
    960 </table>
    961 <p>* Supported Google devices on Android 7.0 or later that have installed all
    962 available updates are not affected by this vulnerability.</p>
    963 
    964 <h3 id="rce-in-freetype">Remote code execution vulnerability in Freetype</h3>
    965 <p>A remote code execution vulnerability in Freetype could enable a local
    966 malicious application to load a specially crafted font to cause memory
    967 corruption in an unprivileged process. This issue is rated as High due to the
    968 possibility of remote code execution in an application that uses this library.</p>
    969 
    970 <table>
    971   <col width="18%">
    972   <col width="17%">
    973   <col width="10%">
    974   <col width="19%">
    975   <col width="18%">
    976   <col width="17%">
    977   <tr>
    978     <th>CVE</th>
    979     <th>References</th>
    980     <th>Severity</th>
    981     <th>Updated Google devices</th>
    982     <th>Updated AOSP versions</th>
    983     <th>Date reported</th>
    984   </tr>
    985   <tr>
    986     <td>CVE-2016-10244</td>
    987     <td>A-31470908</td>
    988     <td>High</td>
    989     <td>None*</td>
    990     <td>4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0</td>
    991     <td>Sep 13, 2016</td>
    992   </tr>
    993 </table>
    994 <p>* Supported Google devices on Android 7.0 or later that have installed all
    995 available updates are not affected by this vulnerability.</p>
    996 
    997 <h3 id="eop-in-kernel-sound-subsystem">Elevation of privilege vulnerability in
    998 kernel sound subsystem</h3>
    999 <p>An elevation of privilege vulnerability in the kernel sound subsystem could
   1000 enable a local malicious application to execute arbitrary code within the
   1001 context of the kernel. This issue is rated as High because it first requires
   1002 compromising a privileged process.</p>
   1003 
   1004 <table>
   1005   <col width="19%">
   1006   <col width="20%">
   1007   <col width="10%">
   1008   <col width="23%">
   1009   <col width="17%">
   1010   <tr>
   1011     <th>CVE</th>
   1012     <th>References</th>
   1013     <th>Severity</th>
   1014     <th>Updated Google devices</th>
   1015     <th>Date reported</th>
   1016   </tr>
   1017   <tr>
   1018     <td>CVE-2014-4656</td>
   1019     <td>A-34464977<br>
   1020         <a 
   1021 href="http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=883a1d49f0d77d30012f114b2e19fc141beb3e8e">
   1022 Upstream kernel</a></td>
   1023     <td>High</td>
   1024     <td>Nexus 6, Nexus Player</td>
   1025     <td>Jun 26, 2014</td>
   1026   </tr>
   1027 </table>
   1028 
   1029 
   1030 <h3 id="eop-in-nvidia-crypto-driver">Elevation of privilege vulnerability in
   1031 NVIDIA crypto driver</h3>
   1032 <p>An elevation of privilege vulnerability in the NVIDIA crypto driver could
   1033 enable a local malicious application to execute arbitrary code within the
   1034 context of the kernel. This issue is rated as High because it first requires
   1035 compromising a privileged process.</p>
   1036 
   1037 <table>
   1038   <col width="19%">
   1039   <col width="20%">
   1040   <col width="10%">
   1041   <col width="23%">
   1042   <col width="17%">
   1043   <tr>
   1044     <th>CVE</th>
   1045     <th>References</th>
   1046     <th>Severity</th>
   1047     <th>Updated Google devices</th>
   1048     <th>Date reported</th>
   1049   </tr>
   1050   <tr>
   1051     <td>CVE-2017-0339</td>
   1052     <td>A-27930566*<br>
   1053         N-CVE-2017-0339</td>
   1054     <td>High</td>
   1055     <td>Nexus 9</td>
   1056     <td>Mar 29, 2016</td>
   1057   </tr>
   1058   <tr>
   1059     <td>CVE-2017-0332</td>
   1060     <td>A-33812508*<br>
   1061         N-CVE-2017-0332</td>
   1062     <td>High</td>
   1063     <td>Nexus 9</td>
   1064     <td>Dec 21, 2016</td>
   1065   </tr>
   1066   <tr>
   1067     <td>CVE-2017-0327</td>
   1068     <td>A-33893669*<br>
   1069         N-CVE-2017-0327</td>
   1070     <td>High</td>
   1071     <td>Nexus 9</td>
   1072     <td>Dec 24, 2016</td>
   1073   </tr>
   1074 </table>
   1075 <p>* The patch for this issue is not publicly available. The update is contained
   1076 in the latest binary drivers for Nexus devices available from the
   1077 <a href="https://developers.google.com/android/nexus/drivers">
   1078 Google Developer site</a>.</p>
   1079 
   1080 
   1081 <h3 id="eop-in-mediatek-thermal-driver">Elevation of privilege vulnerability in
   1082 MediaTek thermal driver</h3>
   1083 <p>An elevation of privilege vulnerability in the MediaTek thermal driver could
   1084 enable a local malicious application to execute arbitrary code within the
   1085 context of the kernel. This issue is rated as High because it first requires
   1086 compromising a privileged process.</p>
   1087 
   1088 <table>
   1089   <col width="19%">
   1090   <col width="20%">
   1091   <col width="10%">
   1092   <col width="23%">
   1093   <col width="17%">
   1094   <tr>
   1095     <th>CVE</th>
   1096     <th>References</th>
   1097     <th>Severity</th>
   1098     <th>Updated Google devices</th>
   1099     <th>Date reported</th>
   1100   </tr>
   1101   <tr>
   1102     <td>CVE-2017-0565</td>
   1103     <td>A-28175904*<br>
   1104         M-ALPS02696516</td>
   1105     <td>High</td>
   1106     <td>None**</td>
   1107     <td>Apr 11, 2016</td>
   1108   </tr>
   1109 </table>
   1110 <p>* The patch for this issue is not publicly available. The update is contained
   1111 in the latest binary drivers for Nexus devices available from the
   1112 <a href="https://developers.google.com/android/nexus/drivers">
   1113 Google Developer site</a>.</p>
   1114 <p>** Supported Google devices on Android 7.0 or later that have installed all
   1115 available updates are not affected by this vulnerability.</p>
   1116 
   1117 
   1118 <h3 id="eop-in-mediatek-camera-driver">Elevation of privilege vulnerability in
   1119 MediaTek camera driver</h3>
   1120 <p>An elevation of privilege vulnerability in the MediaTek camera driver could
   1121 enable a local malicious application to execute arbitrary code within the
   1122 context of the kernel. This issue is rated as High because it first requires
   1123 compromising a privileged process.</p>
   1124 
   1125 <table>
   1126   <col width="19%">
   1127   <col width="20%">
   1128   <col width="10%">
   1129   <col width="23%">
   1130   <col width="17%">
   1131   <tr>
   1132     <th>CVE</th>
   1133     <th>References</th>
   1134     <th>Severity</th>
   1135     <th>Updated Google devices</th>
   1136     <th>Date reported</th>
   1137   </tr>
   1138   <tr>
   1139     <td>CVE-2017-0566</td>
   1140     <td>A-28470975*<br>
   1141         M-ALPS02696367</td>
   1142     <td>High</td>
   1143     <td>None**</td>
   1144     <td>Apr 29, 2016</td>
   1145   </tr>
   1146 </table>
   1147 <p>* The patch for this issue is not publicly available. The update is contained
   1148 in the latest binary drivers for Nexus devices available from the
   1149 <a href="https://developers.google.com/android/nexus/drivers">
   1150 Google Developer site</a>.</p>
   1151 <p>** Supported Google devices on Android 7.0 or later that have installed all
   1152 available updates are not affected by this vulnerability.</p>
   1153 
   1154 
   1155 <h3 id="eop-in-broadcom-wi-fi-driver">Elevation of privilege vulnerability in
   1156 Broadcom Wi-Fi driver</h3>
   1157 <p>An elevation of privilege vulnerability in the Broadcom Wi-Fi driver could
   1158 enable a local malicious application to execute arbitrary code within the
   1159 context of the kernel. This issue is rated as High because it first requires
   1160 compromising a privileged process.</p>
   1161 
   1162 <table>
   1163   <col width="19%">
   1164   <col width="20%">
   1165   <col width="10%">
   1166   <col width="23%">
   1167   <col width="17%">
   1168   <tr>
   1169     <th>CVE</th>
   1170     <th>References</th>
   1171     <th>Severity</th>
   1172     <th>Updated Google devices</th>
   1173     <th>Date reported</th>
   1174   </tr>
   1175   <tr>
   1176     <td>CVE-2017-0567</td>
   1177     <td>A-32125310*<br>
   1178         B-RB#112575</td>
   1179     <td>High</td>
   1180     <td>Nexus 6, Nexus 6P, Nexus 9, Pixel C, Nexus Player</td>
   1181     <td>Oct 12, 2016</td>
   1182   </tr>
   1183   <tr>
   1184     <td>CVE-2017-0568</td>
   1185     <td>A-34197514*<br>
   1186         B-RB#112600</td>
   1187     <td>High</td>
   1188     <td>Nexus 6, Nexus 6P, Nexus 9, Pixel C, Nexus Player</td>
   1189     <td>Jan 9, 2017</td>
   1190   </tr>
   1191   <tr>
   1192     <td>CVE-2017-0569</td>
   1193     <td>A-34198729*<br>
   1194         B-RB#110666</td>
   1195     <td>High</td>
   1196     <td>Nexus 6, Nexus 6P, Nexus 9, Pixel C, Nexus Player</td>
   1197     <td>Jan 9, 2017</td>
   1198   </tr>
   1199   <tr>
   1200     <td>CVE-2017-0570</td>
   1201     <td>A-34199963*<br>
   1202         B-RB#110688</td>
   1203     <td>High</td>
   1204     <td>Nexus 6, Nexus 6P, Nexus 9, Pixel C, Nexus Player</td>
   1205     <td>Jan 9, 2017</td>
   1206   </tr>
   1207   <tr>
   1208     <td>CVE-2017-0571</td>
   1209     <td>A-34203305*<br>
   1210         B-RB#111541</td>
   1211     <td>High</td>
   1212     <td>Nexus 6, Nexus 6P, Pixel C, Nexus Player</td>
   1213     <td>Jan 9, 2017</td>
   1214   </tr>
   1215   <tr>
   1216     <td>CVE-2017-0572</td>
   1217     <td>A-34198931*<br>
   1218         B-RB#112597</td>
   1219     <td>High</td>
   1220     <td>None**</td>
   1221     <td>Jan 9, 2017</td>
   1222   </tr>
   1223   <tr>
   1224     <td>CVE-2017-0573</td>
   1225     <td>A-34469904*<br>
   1226         B-RB#91539</td>
   1227     <td>High</td>
   1228     <td>Nexus 6, Nexus 6P, Nexus 9, Pixel C, Nexus Player</td>
   1229     <td>Jan 18, 2017</td>
   1230   </tr>
   1231   <tr>
   1232     <td>CVE-2017-0574</td>
   1233     <td>A-34624457*<br>
   1234         B-RB#113189</td>
   1235     <td>High</td>
   1236     <td>Nexus 6, Nexus 6P, Nexus 9, Pixel C</td>
   1237     <td>Jan 22, 2017</td>
   1238   </tr>
   1239 </table>
   1240 <p>* The patch for this issue is not publicly available. The update is contained
   1241 in the latest binary drivers for Nexus devices available from the
   1242 <a href="https://developers.google.com/android/nexus/drivers">
   1243 Google Developer site</a>.</p>
   1244 <p>** Supported Google devices on Android 7.0 or later that have installed all
   1245 available updates are not affected by this vulnerability.</p>
   1246 
   1247 
   1248 <h3 id="eop-in-qualcomm-wi-fi-driver">Elevation of privilege vulnerability in
   1249 Qualcomm Wi-Fi driver</h3>
   1250 <p>An elevation of privilege vulnerability in the Qualcomm Wi-Fi driver could
   1251 enable a local malicious application to execute arbitrary code within the
   1252 context of the kernel. This issue is rated as High because it first requires
   1253 compromising a privileged process.</p>
   1254 
   1255 <table>
   1256   <col width="19%">
   1257   <col width="20%">
   1258   <col width="10%">
   1259   <col width="23%">
   1260   <col width="17%">
   1261   <tr>
   1262     <th>CVE</th>
   1263     <th>References</th>
   1264     <th>Severity</th>
   1265     <th>Updated Google devices</th>
   1266     <th>Date reported</th>
   1267   </tr>
   1268   <tr>
   1269     <td>CVE-2017-0575</td>
   1270     <td>A-32658595*<br>
   1271         QC-CR#1103099</td>
   1272     <td>High</td>
   1273     <td>Nexus 5X, Pixel, Pixel XL</td>
   1274     <td>Nov 3, 2016</td>
   1275   </tr>
   1276 </table>
   1277 <p>* The patch for this issue is not publicly available. The update is contained
   1278 in the latest binary drivers for Nexus devices available from the
   1279 <a href="https://developers.google.com/android/nexus/drivers">
   1280 Google Developer site</a>.</p>
   1281 
   1282 
   1283 <h3 id="eop-in-nvidia-i2c-hid-driver">Elevation of privilege vulnerability in
   1284 NVIDIA I2C HID driver</h3>
   1285 <p>An elevation of privilege vulnerability in the NVIDIA I2C HID driver could
   1286 enable a local malicious application to execute arbitrary code within the
   1287 context of the kernel. This issue is rated as High because it first requires
   1288 compromising a privileged process.</p>
   1289 
   1290 <table>
   1291   <col width="19%">
   1292   <col width="20%">
   1293   <col width="10%">
   1294   <col width="23%">
   1295   <col width="17%">
   1296   <tr>
   1297     <th>CVE</th>
   1298     <th>References</th>
   1299     <th>Severity</th>
   1300     <th>Updated Google devices</th>
   1301     <th>Date reported</th>
   1302   </tr>
   1303   <tr>
   1304     <td>CVE-2017-0325</td>
   1305     <td>A-33040280*<br>
   1306         N-CVE-2017-0325</td>
   1307     <td>High</td>
   1308     <td>Nexus 9, Pixel C</td>
   1309     <td>Nov 20, 2016</td>
   1310   </tr>
   1311 </table>
   1312 <p>* The patch for this issue is not publicly available. The update is contained
   1313 in the latest binary drivers for Nexus devices available from the
   1314 <a href="https://developers.google.com/android/nexus/drivers">
   1315 Google Developer site</a>.</p>
   1316 
   1317 
   1318 <h3 id="eop-in-qualcomm-audio-driver">Elevation of privilege vulnerability in
   1319 Qualcomm audio driver</h3>
   1320 <p>An elevation of privilege vulnerability in the Qualcomm audio driver could
   1321 enable a local malicious application to execute arbitrary code within the
   1322 context of the kernel. This issue is rated as High because it first requires
   1323 compromising a privileged process.</p>
   1324 
   1325 <table>
   1326   <col width="19%">
   1327   <col width="20%">
   1328   <col width="10%">
   1329   <col width="23%">
   1330   <col width="17%">
   1331   <tr>
   1332     <th>CVE</th>
   1333     <th>References</th>
   1334     <th>Severity</th>
   1335     <th>Updated Google devices</th>
   1336     <th>Date reported</th>
   1337   </tr>
   1338   <tr>
   1339     <td>CVE-2017-0454</td>
   1340     <td>A-33353700<br>
   1341         <a 
   1342 href="https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=cb0701a2f99fa19f01fbd4249bda9a8eadb0241f">
   1343 QC-CR#1104067</a></td>
   1344     <td>High</td>
   1345     <td>Nexus 5X, Nexus 6P, Pixel, Pixel XL</td>
   1346     <td>Dec 5, 2016</td>
   1347   </tr>
   1348 </table>
   1349 
   1350 
   1351 <h3 id="eop-in-qualcomm-crypto-engine-driver">Elevation of privilege
   1352 vulnerability in Qualcomm crypto engine driver</h3>
   1353 <p>An elevation of privilege vulnerability in the Qualcomm crypto engine driver
   1354 could enable a local malicious application to execute arbitrary code within the
   1355 context of the kernel. This issue is rated as High because it first requires
   1356 compromising a privileged process.</p>
   1357 
   1358 <table>
   1359   <col width="19%">
   1360   <col width="20%">
   1361   <col width="10%">
   1362   <col width="23%">
   1363   <col width="17%">
   1364   <tr>
   1365     <th>CVE</th>
   1366     <th>References</th>
   1367     <th>Severity</th>
   1368     <th>Updated Google devices</th>
   1369     <th>Date reported</th>
   1370   </tr>
   1371   <tr>
   1372     <td>CVE-2017-0576</td>
   1373     <td>A-33544431<br>
   1374         <a 
   1375 href="https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=2b09507d78b25637df6879cd2ee2031b208b3532">
   1376 QC-CR#1103089</a></td>
   1377     <td>High</td>
   1378     <td>Nexus 5X, Nexus 6, Nexus 6P, Pixel, Pixel XL, Android One</td>
   1379     <td>Dec 9, 2016</td>
   1380   </tr>
   1381 </table>
   1382 
   1383 
   1384 <h3 id="eop-in-htc-touchscreen-driver-2">Elevation of privilege vulnerability
   1385 in HTC touchscreen driver</h3>
   1386 <p>An elevation of privilege vulnerability in the HTC touchscreen driver could
   1387 enable a local malicious application to execute arbitrary code within the
   1388 context of the kernel. This issue is rated as High because it first requires
   1389 compromising a privileged process.</p>
   1390 
   1391 <table>
   1392   <col width="19%">
   1393   <col width="20%">
   1394   <col width="10%">
   1395   <col width="23%">
   1396   <col width="17%">
   1397   <tr>
   1398     <th>CVE</th>
   1399     <th>References</th>
   1400     <th>Severity</th>
   1401     <th>Updated Google devices</th>
   1402     <th>Date reported</th>
   1403   </tr>
   1404   <tr>
   1405     <td>CVE-2017-0577</td>
   1406     <td>A-33842951*<br>
   1407         </td>
   1408     <td>High</td>
   1409     <td>None**</td>
   1410     <td>Dec 21, 2016</td>
   1411   </tr>
   1412 </table>
   1413 <p>* The patch for this issue is not publicly available. The update is contained
   1414 in the latest binary drivers for Nexus devices available from the
   1415 <a href="https://developers.google.com/android/nexus/drivers">
   1416 Google Developer site</a>.</p>
   1417 <p>** Supported Google devices on Android 7.0 or later that have installed all
   1418 available updates are not affected by this vulnerability.</p>
   1419 
   1420 
   1421 <h3 id="eop-in-dts-sound-driver">Elevation of privilege vulnerability in DTS
   1422 sound driver</h3>
   1423 <p>An elevation of privilege vulnerability in the DTS sound driver could enable a
   1424 local malicious application to execute arbitrary code within the context of the
   1425 kernel. This issue is rated as High because it first requires compromising a
   1426 privileged process.</p>
   1427 
   1428 <table>
   1429   <col width="19%">
   1430   <col width="20%">
   1431   <col width="10%">
   1432   <col width="23%">
   1433   <col width="17%">
   1434   <tr>
   1435     <th>CVE</th>
   1436     <th>References</th>
   1437     <th>Severity</th>
   1438     <th>Updated Google devices</th>
   1439     <th>Date reported</th>
   1440   </tr>
   1441   <tr>
   1442     <td>CVE-2017-0578</td>
   1443     <td>A-33964406*<br>
   1444         </td>
   1445     <td>High</td>
   1446     <td>None**</td>
   1447     <td>Dec 28, 2016</td>
   1448   </tr>
   1449 </table>
   1450 <p>* The patch for this issue is not publicly available. The update is contained
   1451 in the latest binary drivers for Nexus devices available from the
   1452 <a href="https://developers.google.com/android/nexus/drivers">
   1453 Google Developer site</a>.</p>
   1454 <p>** Supported Google devices on Android 7.0 or later that have installed all
   1455 available updates are not affected by this vulnerability.</p>
   1456 
   1457 
   1458 <h3 id="eop-in-qualcomm-sound-codec-driver">Elevation of privilege
   1459 vulnerability in Qualcomm sound codec driver</h3>
   1460 <p>An elevation of privilege vulnerability in the Qualcomm sound codec driver
   1461 could enable a local malicious application to execute arbitrary code within the
   1462 context of the kernel. This issue is rated as High because it first requires
   1463 compromising a privileged process.</p>
   1464 
   1465 <table>
   1466   <col width="19%">
   1467   <col width="20%">
   1468   <col width="10%">
   1469   <col width="23%">
   1470   <col width="17%">
   1471   <tr>
   1472     <th>CVE</th>
   1473     <th>References</th>
   1474     <th>Severity</th>
   1475     <th>Updated Google devices</th>
   1476     <th>Date reported</th>
   1477   </tr>
   1478   <tr>
   1479     <td>CVE-2016-10231</td>
   1480     <td>A-33966912<br>
   1481         <a 
   1482 href="https://source.codeaurora.org/quic/la//kernel/msm-3.18/commit/?id=3bfe5a89916f7d29492e9f6d941d108b688cb804">
   1483 QC-CR#1096799</a></td>
   1484     <td>High</td>
   1485     <td>Pixel, Pixel XL</td>
   1486     <td>Dec 29, 2016</td>
   1487   </tr>
   1488 </table>
   1489 
   1490 
   1491 <h3 id="eop-in-qualcomm-video-driver">Elevation of privilege vulnerability in
   1492 Qualcomm video driver</h3>
   1493 <p>An elevation of privilege vulnerability in the Qualcomm video driver could
   1494 enable a local malicious application to execute arbitrary code within the
   1495 context of the kernel. This issue is rated as High because it first requires
   1496 compromising a privileged process.</p>
   1497 
   1498 <table>
   1499   <col width="19%">
   1500   <col width="20%">
   1501   <col width="10%">
   1502   <col width="23%">
   1503   <col width="17%">
   1504   <tr>
   1505     <th>CVE</th>
   1506     <th>References</th>
   1507     <th>Severity</th>
   1508     <th>Updated Google devices</th>
   1509     <th>Date reported</th>
   1510   </tr>
   1511   <tr>
   1512     <td>CVE-2017-0579</td>
   1513     <td>A-34125463*<br>
   1514         QC-CR#1115406</td>
   1515     <td>High</td>
   1516     <td>Nexus 5X, Nexus 6P, Pixel, Pixel XL</td>
   1517     <td>Jan 5, 2017</td>
   1518   </tr>
   1519   <tr>
   1520     <td>CVE-2016-10232</td>
   1521     <td>A-34386696<br>
   1522         <a 
   1523 href="https://source.codeaurora.org/quic/la//kernel/msm-3.10/commit/?id=21e0ead58e47798567d846b84f16f89cf69a57ae">
   1524 QC-CR#1024872</a> <a 
   1525 href="https://source.codeaurora.org/quic/la//kernel/msm-3.18/commit/?id=27f7b3b3059f6181e2786f886f4cd92f413bc30c">
   1526 [2]</a></td>
   1527     <td>High</td>
   1528     <td>Nexus 5X, Nexus 6P, Pixel, Pixel XL, Android One</td>
   1529     <td>Jan 10, 2017</td>
   1530   </tr>
   1531   <tr>
   1532     <td>CVE-2016-10233</td>
   1533     <td>A-34389926<br>
   1534         <a 
   1535 href="https://source.codeaurora.org/quic/la/kernel/msm/commit/?id=d793c6d91ecba2a1fd206ad47a4fd408d290addf">
   1536 QC-CR#897452</a></td>
   1537     <td>High</td>
   1538     <td>None**</td>
   1539     <td>Jan 10, 2017</td>
   1540   </tr>
   1541 </table>
   1542 <p>* The patch for this issue is not publicly available. The update is contained
   1543 in the latest binary drivers for Nexus devices available from the
   1544 <a href="https://developers.google.com/android/nexus/drivers">
   1545 Google Developer site</a>.</p>
   1546 <p>** Supported Google devices on Android 7.0 or later that have installed all
   1547 available updates are not affected by this vulnerability.</p>
   1548 
   1549 
   1550 <h3 id="eop-in-nvidia-boot-and-power-management-processor-driver">Elevation of
   1551 privilege vulnerability in NVIDIA boot and power management processor
   1552 driver</h3>
   1553 <p>An elevation of privilege vulnerability in the NVIDIA boot and power management
   1554 processor driver could enable a local malicious application to execute
   1555 arbitrary code within the context of the boot and power management processor.
   1556 This issue is rated as High because it first requires compromising a privileged
   1557 process.</p>
   1558 
   1559 <table>
   1560   <col width="19%">
   1561   <col width="20%">
   1562   <col width="10%">
   1563   <col width="23%">
   1564   <col width="17%">
   1565   <tr>
   1566     <th>CVE</th>
   1567     <th>References</th>
   1568     <th>Severity</th>
   1569     <th>Updated Google devices</th>
   1570     <th>Date reported</th>
   1571   </tr>
   1572   <tr>
   1573     <td>CVE-2017-0329</td>
   1574     <td>A-34115304*<br>
   1575         N-CVE-2017-0329</td>
   1576     <td>High</td>
   1577     <td>Pixel C</td>
   1578     <td>Jan 5, 2017</td>
   1579   </tr>
   1580 </table>
   1581 <p>* The patch for this issue is not publicly available. The update is contained
   1582 in the latest binary drivers for Nexus devices available from the
   1583 <a href="https://developers.google.com/android/nexus/drivers">
   1584 Google Developer site</a>.</p>
   1585 
   1586 
   1587 <h3 id="eop-in-synaptics-touchscreen-driver">Elevation of privilege
   1588 vulnerability in Synaptics touchscreen driver</h3>
   1589 <p>An elevation of privilege vulnerability in the Synaptics Touchscreen driver
   1590 could enable a local malicious application to execute arbitrary code within the
   1591 context of the kernel. This issue is rated as High because it first requires
   1592 compromising a privileged process.</p>
   1593 
   1594 <table>
   1595   <col width="19%">
   1596   <col width="20%">
   1597   <col width="10%">
   1598   <col width="23%">
   1599   <col width="17%">
   1600   <tr>
   1601     <th>CVE</th>
   1602     <th>References</th>
   1603     <th>Severity</th>
   1604     <th>Updated Google devices</th>
   1605     <th>Date reported</th>
   1606   </tr>
   1607   <tr>
   1608     <td>CVE-2017-0580</td>
   1609     <td>A-34325986*<br>
   1610         </td>
   1611     <td>High</td>
   1612     <td>None**</td>
   1613     <td>Jan 16, 2017</td>
   1614   </tr>
   1615   <tr>
   1616     <td>CVE-2017-0581</td>
   1617     <td>A-34614485*<br>
   1618         </td>
   1619     <td>High</td>
   1620     <td>None**</td>
   1621     <td>Jan 22, 2017</td>
   1622   </tr>
   1623 </table>
   1624 <p>* The patch for this issue is not publicly available. The update is contained
   1625 in the latest binary drivers for Nexus devices available from the
   1626 <a href="https://developers.google.com/android/nexus/drivers">
   1627 Google Developer site</a>.</p>
   1628 <p>** Supported Google devices on Android 7.0 or later that have installed all
   1629 available updates are not affected by this vulnerability.</p>
   1630 
   1631 
   1632 <h3 id="eop-in-qualcomm-seemp-driver">Elevation of privilege vulnerability in
   1633 Qualcomm Seemp driver</h3>
   1634 <p>An elevation of privilege vulnerability in the Qualcomm Seemp driver could
   1635 enable a local malicious application to execute arbitrary code within the
   1636 context of the kernel. This issue is rated as High because it first requires
   1637 compromising a privileged process.</p>
   1638 
   1639 <table>
   1640   <col width="19%">
   1641   <col width="20%">
   1642   <col width="10%">
   1643   <col width="23%">
   1644   <col width="17%">
   1645   <tr>
   1646     <th>CVE</th>
   1647     <th>References</th>
   1648     <th>Severity</th>
   1649     <th>Updated Google devices</th>
   1650     <th>Date reported</th>
   1651   </tr>
   1652   <tr>
   1653     <td>CVE-2017-0462</td>
   1654     <td>A-33353601<br>
   1655         <a 
   1656 href="https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=eb7b1426279e751b1fc3e86f434dc349945c1ae7">
   1657 QC-CR#1102288</a></td>
   1658     <td>High</td>
   1659     <td>Pixel, Pixel XL</td>
   1660     <td>Google internal</td>
   1661   </tr>
   1662 </table>
   1663 
   1664 
   1665 <h3 id="eop-in-qualcomm-kyro-l2-driver">Elevation of privilege vulnerability in
   1666 Qualcomm Kyro L2 driver</h3>
   1667 <p>An elevation of privilege vulnerability in the Qualcomm Kyro L2 driver could
   1668 enable a local malicious application to execute arbitrary code within the
   1669 context of the kernel. This issue is rated as High because it first requires
   1670 compromising a privileged process.</p>
   1671 
   1672 <table>
   1673   <col width="19%">
   1674   <col width="20%">
   1675   <col width="10%">
   1676   <col width="23%">
   1677   <col width="17%">
   1678   <tr>
   1679     <th>CVE</th>
   1680     <th>References</th>
   1681     <th>Severity</th>
   1682     <th>Updated Google devices</th>
   1683     <th>Date reported</th>
   1684   </tr>
   1685   <tr>
   1686     <td>CVE-2017-6423</td>
   1687     <td>A-32831370<br>
   1688         <a 
   1689 href="https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=0f264f812b61884390b432fdad081a3e995ba768">
   1690 QC-CR#1103158</a></td>
   1691     <td>High</td>
   1692     <td>Pixel, Pixel XL</td>
   1693     <td>Google internal</td>
   1694   </tr>
   1695 </table>
   1696 
   1697 
   1698 <h3 id="eop-in-kernel-file-system">Elevation of privilege vulnerability in
   1699 kernel file system</h3>
   1700 <p>An elevation of privilege vulnerability in the kernel file system could enable
   1701 a local malicious application to execute arbitrary code within the context of
   1702 the kernel. This issue is rated as High because it first requires compromising
   1703 a privileged process.</p>
   1704 
   1705 <table>
   1706   <col width="19%">
   1707   <col width="20%">
   1708   <col width="10%">
   1709   <col width="23%">
   1710   <col width="17%">
   1711   <tr>
   1712     <th>CVE</th>
   1713     <th>References</th>
   1714     <th>Severity</th>
   1715     <th>Updated Google devices</th>
   1716     <th>Date reported</th>
   1717   </tr>
   1718   <tr>
   1719     <td>CVE-2014-9922</td>
   1720     <td>A-32761463<br>
   1721         <a
   1722 href="http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=69c433ed2ecd2d3264efd7afec4439524b319121">
   1723 Upstream kernel</a></td>
   1724     <td>High</td>
   1725     <td>Nexus 5X, Nexus 6, Nexus 6P, Nexus 9, Pixel, Pixel XL, Pixel C, Android
   1726 One, Nexus Player</td>
   1727     <td>Oct 24, 2014</td>
   1728   </tr>
   1729 </table>
   1730 
   1731 
   1732 <h3 id="id-in-kernel-memory-subsystem">Information disclosure vulnerability in
   1733 kernel memory subsystem</h3>
   1734 <p>An information disclosure vulnerability in the kernel memory subsystem could
   1735 enable a local malicious application to access data outside of its permission
   1736 levels. This issue is rated as High because it could be used to access
   1737 sensitive data without explicit user permission.</p>
   1738 
   1739 <table>
   1740   <col width="19%">
   1741   <col width="20%">
   1742   <col width="10%">
   1743   <col width="23%">
   1744   <col width="17%">
   1745   <tr>
   1746     <th>CVE</th>
   1747     <th>References</th>
   1748     <th>Severity</th>
   1749     <th>Updated Google devices</th>
   1750     <th>Date reported</th>
   1751   </tr>
   1752   <tr>
   1753     <td>CVE-2014-0206</td>
   1754     <td>A-34465735<br>
   1755         <a 
   1756 href="https://git.kernel.org/cgit/linux/kernel/git/stable/linux-stable.git/commit/?id=d36db46c2cba973557eb6138d22210c4e0cf17d6">
   1757 Upstream kernel</a></td>
   1758     <td>High</td>
   1759     <td>Nexus 6, Nexus Player</td>
   1760     <td>May 6, 2014</td>
   1761   </tr>
   1762 </table>
   1763 
   1764 
   1765 <h3 id="id-in-kernel-networking-subsystem">Information disclosure vulnerability
   1766 in kernel networking subsystem</h3>
   1767 <p>An information disclosure vulnerability in the kernel networking subsystem
   1768 could enable a local malicious application to access data outside of its
   1769 permission levels. This issue is rated as High because it could be used to
   1770 access sensitive data without explicit user permission.</p>
   1771 
   1772 <table>
   1773   <col width="19%">
   1774   <col width="20%">
   1775   <col width="10%">
   1776   <col width="23%">
   1777   <col width="17%">
   1778   <tr>
   1779     <th>CVE</th>
   1780     <th>References</th>
   1781     <th>Severity</th>
   1782     <th>Updated Google devices</th>
   1783     <th>Date reported</th>
   1784   </tr>
   1785   <tr>
   1786     <td>CVE-2014-3145</td>
   1787     <td>A-34469585<br>
   1788         <a 
   1789 href="https://git.kernel.org/cgit/linux/kernel/git/stable/linux-stable.git/commit/?id=314760e66c35c8ffa51b4c4ca6948d207e783079">
   1790 Upstream kernel</a> <a 
   1791 href="http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=05ab8f2647e4221cbdb3856dd7d32bd5407316b3">
   1792 [2]</a></td>
   1793     <td>High</td>
   1794     <td>Nexus 6, Nexus Player</td>
   1795     <td>May 9, 2014</td>
   1796   </tr>
   1797 </table>
   1798 
   1799 
   1800 <h3 id="id-in-qualcomm-trustzone">Information disclosure vulnerability in
   1801 Qualcomm TrustZone</h3>
   1802 <p>An information disclosure vulnerability in the Qualcomm TrustZone could enable
   1803 a local malicious application to access data outside of its permission levels.
   1804 This issue is rated as High because it could be used to access sensitive data
   1805 without explicit user permission.</p>
   1806 
   1807 <table>
   1808   <col width="19%">
   1809   <col width="20%">
   1810   <col width="10%">
   1811   <col width="23%">
   1812   <col width="17%">
   1813   <tr>
   1814     <th>CVE</th>
   1815     <th>References</th>
   1816     <th>Severity</th>
   1817     <th>Updated Google devices</th>
   1818     <th>Date reported</th>
   1819   </tr>
   1820   <tr>
   1821     <td>CVE-2016-5349</td>
   1822     <td>A-29083830<br>
   1823         <a 
   1824 href="https://source.codeaurora.org/quic/la//kernel/msm-3.18/commit/?id=7c3bf6557c62d904b15507eb451fda8fd7ef750c">
   1825 QC-CR#1021945</a> <a 
   1826 href="https://source.codeaurora.org/quic/la//kernel/msm-3.18/commit/?id=03853a58952834ac3e1e3007c9c680dd4c001a2f">
   1827 [2]</a> <a 
   1828 href="https://source.codeaurora.org/quic/la//kernel/msm-3.18/commit/?id=e3d969000fb60ecb9bc01667fa89957f67763514">
   1829 [3]</a> <a 
   1830 href="https://source.codeaurora.org/quic/la//kernel/msm-3.18/commit/?id=9bd398661cae758ffc557adc7de74ba32654e1f9">
   1831 [4]</a></td>
   1832     <td>High</td>
   1833     <td>Nexus 5X, Nexus 6, Nexus 6P, Pixel, Pixel XL, Android One</td>
   1834     <td>Jun 1, 2016</td>
   1835   </tr>
   1836 </table>
   1837 
   1838 
   1839 <h3 id="id-in-qualcomm-ipa-driver">Information disclosure vulnerability in
   1840 Qualcomm IPA driver</h3>
   1841 <p>An information disclosure vulnerability in the Qualcomm IPA driver could enable
   1842 a local malicious application to access data outside of its permission levels.
   1843 This issue is rated as High because it could be used to access sensitive data
   1844 without explicit user permission.</p>
   1845 
   1846 <table>
   1847   <col width="19%">
   1848   <col width="20%">
   1849   <col width="10%">
   1850   <col width="23%">
   1851   <col width="17%">
   1852   <tr>
   1853     <th>CVE</th>
   1854     <th>References</th>
   1855     <th>Severity</th>
   1856     <th>Updated Google devices</th>
   1857     <th>Date reported</th>
   1858   </tr>
   1859   <tr>
   1860     <td>CVE-2016-10234</td>
   1861     <td>A-34390017<br>
   1862         <a 
   1863 href="https://source.codeaurora.org/quic/la/kernel/msm-3.10/commit/?id=c7d7492c1e329fdeb28a7901c4cd634d41a996b1">
   1864 QC-CR#1069060</a> <a 
   1865 href="https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=d12370c7f3ecded1867fbd6b70ded35db55cab1d">
   1866 [2]</a></td>
   1867     <td>High</td>
   1868     <td>Nexus 5X, Nexus 6P, Pixel, Pixel XL</td>
   1869     <td>Jan 10, 2017</td>
   1870   </tr>
   1871 </table>
   1872 
   1873 
   1874 <h3 id="dos-in-kernel-networking-subsystem">Denial of service vulnerability in
   1875 kernel networking subsystem</h3>
   1876 <p>A denial of service vulnerability in the kernel networking subsystem could
   1877 enable a remote attacker to use a specially crafted network packet to cause a
   1878 device hang or reboot. This issue is rated as High due to the possibility of
   1879 remote denial of service.</p>
   1880 
   1881 <table>
   1882   <col width="19%">
   1883   <col width="20%">
   1884   <col width="10%">
   1885   <col width="23%">
   1886   <col width="17%">
   1887   <tr>
   1888     <th>CVE</th>
   1889     <th>References</th>
   1890     <th>Severity</th>
   1891     <th>Updated Google devices</th>
   1892     <th>Date reported</th>
   1893   </tr>
   1894   <tr>
   1895     <td>CVE-2014-2706</td>
   1896     <td>A-34160553<br>
   1897         <a 
   1898 href="https://git.kernel.org/cgit/linux/kernel/git/stable/linux-stable.git/commit/?id=1d147bfa64293b2723c4fec50922168658e613ba">
   1899 Upstream kernel</a></td>
   1900     <td>High</td>
   1901     <td>Nexus Player</td>
   1902     <td>Apr 1, 2014</td>
   1903   </tr>
   1904 </table>
   1905 
   1906 
   1907 <h3 id="dos-in-qualcomm-wi-fi-driver">Denial of service vulnerability in
   1908 Qualcomm Wi-Fi driver</h3>
   1909 <p>A denial of service vulnerability in the Qualcomm Wi-Fi driver could enable a
   1910 proximate attacker to cause a denial of service in the Wi-Fi subsystem. This
   1911 issue is rated as High due to the possibility of remote denial of service.</p>
   1912 
   1913 <table>
   1914   <col width="19%">
   1915   <col width="20%">
   1916   <col width="10%">
   1917   <col width="23%">
   1918   <col width="17%">
   1919   <tr>
   1920     <th>CVE</th>
   1921     <th>References</th>
   1922     <th>Severity</th>
   1923     <th>Updated Google devices</th>
   1924     <th>Date reported</th>
   1925   </tr>
   1926   <tr>
   1927     <td>CVE-2016-10235</td>
   1928     <td>A-34390620<br>
   1929         <a 
   1930 href="https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=5bb0059243515ecdac138cfdb4cee7259bbd0bbc">
   1931 QC-CR#1046409</a></td>
   1932     <td>High</td>
   1933     <td>None**</td>
   1934     <td>Jan 10, 2017</td>
   1935   </tr>
   1936 </table>
   1937 <p>** Supported Google devices on Android 7.0 or later that have installed all
   1938 available updates are not affected by this vulnerability.</p>
   1939 
   1940 
   1941 <h3 id="eop-in-kernel-file-system-2">Elevation of privilege vulnerability in
   1942 kernel file system</h3>
   1943 <p>An elevation of privilege vulnerability in the kernel file system could enable
   1944 a local malicious application to execute arbitrary code outside of its
   1945 permission levels. This issue is rated as Moderate because it first requires
   1946 compromising a privileged process and is mitigated by current platform
   1947 configurations.</p>
   1948 
   1949 <table>
   1950   <col width="19%">
   1951   <col width="20%">
   1952   <col width="10%">
   1953   <col width="23%">
   1954   <col width="17%">
   1955   <tr>
   1956     <th>CVE</th>
   1957     <th>References</th>
   1958     <th>Severity</th>
   1959     <th>Updated Google devices</th>
   1960     <th>Date reported</th>
   1961   </tr>
   1962   <tr>
   1963     <td>CVE-2016-7097</td>
   1964     <td>A-32458736<br>
   1965         <a 
   1966 href="http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=073931017b49d9458aa351605b43a7e34598caef">
   1967 Upstream kernel</a></td>
   1968     <td>Moderate</td>
   1969     <td>Nexus 5X, Nexus 6, Nexus 6P, Nexus 9, Pixel, Pixel XL, Pixel C, Nexus
   1970 Player</td>
   1971     <td>Aug 28, 2016</td>
   1972   </tr>
   1973 </table>
   1974 
   1975 
   1976 <h3 id="eop-in-qualcomm-wi-fi-driver-2">Elevation of privilege vulnerability in
   1977 Qualcomm Wi-Fi driver</h3>
   1978 <p>An elevation of privilege vulnerability in the Qualcomm Wi-Fi driver could
   1979 enable a local malicious application to execute arbitrary code within the
   1980 context of the kernel. This issue is rated as Moderate because it first
   1981 requires compromising a privileged process and because of vulnerability
   1982 specific details which limit the impact of the issue.</p>
   1983 
   1984 <table>
   1985   <col width="19%">
   1986   <col width="20%">
   1987   <col width="10%">
   1988   <col width="23%">
   1989   <col width="17%">
   1990   <tr>
   1991     <th>CVE</th>
   1992     <th>References</th>
   1993     <th>Severity</th>
   1994     <th>Updated Google devices</th>
   1995     <th>Date reported</th>
   1996   </tr>
   1997   <tr>
   1998     <td>CVE-2017-6424</td>
   1999     <td>A-32086742<br>
   2000         <a 
   2001 href="https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=5cc2ac840e36a3342c5194c20b314f0bb95ef7e1">
   2002 QC-CR#1102648</a></td>
   2003     <td>Moderate</td>
   2004     <td>Nexus 5X, Pixel, Pixel XL, Android One</td>
   2005     <td>Oct 9, 2016</td>
   2006   </tr>
   2007 </table>
   2008 
   2009 
   2010 <h3 id="eop-in-broadcom-wi-fi-driver-2">Elevation of privilege vulnerability in
   2011 Broadcom Wi-Fi driver</h3>
   2012 <p>An elevation of privilege vulnerability in the Broadcom Wi-Fi driver could
   2013 enable a local malicious application to execute arbitrary code within the
   2014 context of the kernel. This issue is rated as Moderate because it first
   2015 requires compromising a privileged process and is mitigated by current platform
   2016 configurations.</p>
   2017 
   2018 <table>
   2019   <col width="19%">
   2020   <col width="20%">
   2021   <col width="10%">
   2022   <col width="23%">
   2023   <col width="17%">
   2024   <tr>
   2025     <th>CVE</th>
   2026     <th>References</th>
   2027     <th>Severity</th>
   2028     <th>Updated Google devices</th>
   2029     <th>Date reported</th>
   2030   </tr>
   2031   <tr>
   2032     <td>CVE-2016-8465</td>
   2033     <td>A-32474971*<br>
   2034         B-RB#106053</td>
   2035     <td>Moderate</td>
   2036     <td>Nexus 6, Nexus 6P, Nexus 9, Pixel C, Nexus Player</td>
   2037     <td>Oct 27, 2016</td>
   2038   </tr>
   2039 </table>
   2040 <p>* The patch for this issue is not publicly available. The update is contained
   2041 in the latest binary drivers for Nexus devices available from the
   2042 <a href="https://developers.google.com/android/nexus/drivers">
   2043 Google Developer site</a>.</p>
   2044 
   2045 
   2046 <h3 id="eop-in-htc-oem-fastboot-command">Elevation of privilege vulnerability
   2047 in HTC OEM fastboot command</h3>
   2048 <p>An elevation of privilege vulnerability in the HTC OEM fastboot command could
   2049 enable a local malicious application to execute arbitrary code within the
   2050 context of the sensor hub. This issue is rated as Moderate because it first
   2051 requires exploitation of separate vulnerabilities.</p>
   2052 
   2053 <table>
   2054   <col width="19%">
   2055   <col width="20%">
   2056   <col width="10%">
   2057   <col width="23%">
   2058   <col width="17%">
   2059   <tr>
   2060     <th>CVE</th>
   2061     <th>References</th>
   2062     <th>Severity</th>
   2063     <th>Updated Google devices</th>
   2064     <th>Date reported</th>
   2065   </tr>
   2066   <tr>
   2067     <td>CVE-2017-0582</td>
   2068     <td>A-33178836*<br>
   2069         </td>
   2070     <td>Moderate</td>
   2071     <td>Nexus 9</td>
   2072     <td>Nov 28, 2016</td>
   2073   </tr>
   2074 </table>
   2075 <p>* The patch for this issue is not publicly available. The update is contained
   2076 in the latest binary drivers for Nexus devices available from the
   2077 <a href="https://developers.google.com/android/nexus/drivers">
   2078 Google Developer site</a>.</p>
   2079 
   2080 
   2081 <h3 id="eop-in-qualcomm-cp-access-driver">Elevation of privilege vulnerability
   2082 in Qualcomm CP access driver</h3>
   2083 <p>An elevation of privilege vulnerability in the Qualcomm CP access driver could
   2084 enable a local malicious application to execute arbitrary code within the
   2085 context of the kernel. This issue is rated as Moderate because it first
   2086 requires compromising a privileged process and because of vulnerability
   2087 specific details which limit the impact of the issue.</p>
   2088 
   2089 <table>
   2090   <col width="19%">
   2091   <col width="20%">
   2092   <col width="10%">
   2093   <col width="23%">
   2094   <col width="17%">
   2095   <tr>
   2096     <th>CVE</th>
   2097     <th>References</th>
   2098     <th>Severity</th>
   2099     <th>Updated Google devices</th>
   2100     <th>Date reported</th>
   2101   </tr>
   2102   <tr>
   2103     <td>CVE-2017-0583</td>
   2104     <td>A-32068683<br>
   2105         <a 
   2106 href="https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=452d2ad331d20b19e8a0768c4b6e7fe1b65abe8f">
   2107 QC-CR#1103788</a></td>
   2108     <td>Moderate</td>
   2109     <td>Nexus 5X, Nexus 6P, Pixel, Pixel XL, Android One</td>
   2110     <td>Google internal</td>
   2111   </tr>
   2112 </table>
   2113 
   2114 
   2115 <h3 id="id-in-kernel-media-driver">Information disclosure vulnerability in
   2116 kernel media driver</h3>
   2117 <p>An information disclosure vulnerability in the kernel media driver could enable
   2118 a local malicious application to access data outside of its permission levels.
   2119 This issue is rated as Moderate because it first requires compromising a
   2120 privileged process.</p>
   2121 
   2122 <table>
   2123   <col width="19%">
   2124   <col width="20%">
   2125   <col width="10%">
   2126   <col width="23%">
   2127   <col width="17%">
   2128   <tr>
   2129     <th>CVE</th>
   2130     <th>References</th>
   2131     <th>Severity</th>
   2132     <th>Updated Google devices</th>
   2133     <th>Date reported</th>
   2134   </tr>
   2135   <tr>
   2136     <td>CVE-2014-1739</td>
   2137     <td>A-34460642<br>
   2138         <a 
   2139 href="http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e6a623460e5fc960ac3ee9f946d3106233fd28d8">
   2140 Upstream kernel</a></td>
   2141     <td>Moderate</td>
   2142     <td>Nexus 6, Nexus 9, Nexus Player</td>
   2143     <td>Jun 15, 2014</td>
   2144   </tr>
   2145 </table>
   2146 
   2147 
   2148 <h3 id="id-in-qualcomm-wi-fi-driver">Information disclosure vulnerability in
   2149 Qualcomm Wi-Fi driver</h3>
   2150 <p>An information disclosure vulnerability in the Qualcomm Wi-Fi driver could
   2151 enable a local malicious application to access data outside of its permission
   2152 levels. This issue is rated as Moderate because it first requires compromising
   2153 a privileged process.</p>
   2154 
   2155 <table>
   2156   <col width="19%">
   2157   <col width="20%">
   2158   <col width="10%">
   2159   <col width="23%">
   2160   <col width="17%">
   2161   <tr>
   2162     <th>CVE</th>
   2163     <th>References</th>
   2164     <th>Severity</th>
   2165     <th>Updated Google devices</th>
   2166     <th>Date reported</th>
   2167   </tr>
   2168   <tr>
   2169     <td>CVE-2017-0584</td>
   2170     <td>A-32074353*<br>
   2171         QC-CR#1104731</td>
   2172     <td>Moderate</td>
   2173     <td>Nexus 5X, Pixel, Pixel XL</td>
   2174     <td>Oct 9, 2016</td>
   2175   </tr>
   2176 </table>
   2177 <p>* The patch for this issue is not publicly available. The update is contained
   2178 in the latest binary drivers for Nexus devices available from the
   2179 <a href="https://developers.google.com/android/nexus/drivers">
   2180 Google Developer site</a>.</p>
   2181 
   2182 
   2183 <h3 id="id-in-broadcom-wi-fi-driver">Information disclosure vulnerability in
   2184 Broadcom Wi-Fi driver</h3>
   2185 <p>An information disclosure vulnerability in the Broadcom Wi-Fi driver could
   2186 enable a local malicious application to access data outside of its permission
   2187 levels. This issue is rated as Moderate because it first requires compromising
   2188 a privileged process.</p>
   2189 
   2190 <table>
   2191   <col width="19%">
   2192   <col width="20%">
   2193   <col width="10%">
   2194   <col width="23%">
   2195   <col width="17%">
   2196   <tr>
   2197     <th>CVE</th>
   2198     <th>References</th>
   2199     <th>Severity</th>
   2200     <th>Updated Google devices</th>
   2201     <th>Date reported</th>
   2202   </tr>
   2203   <tr>
   2204     <td>CVE-2017-0585</td>
   2205     <td>A-32475556*<br>
   2206         B-RB#112953</td>
   2207     <td>Moderate</td>
   2208     <td>Nexus 6, Nexus 6P, Nexus 9, Pixel C, Nexus Player</td>
   2209     <td>Oct 27, 2016</td>
   2210   </tr>
   2211 </table>
   2212 <p>* The patch for this issue is not publicly available. The update is contained
   2213 in the latest binary drivers for Nexus devices available from the
   2214 <a href="https://developers.google.com/android/nexus/drivers">
   2215 Google Developer site</a>.</p>
   2216 
   2217 
   2218 <h3 id="id-in-qualcomm-avtimer-driver">Information disclosure vulnerability in
   2219 Qualcomm Avtimer driver</h3>
   2220 <p>An information disclosure vulnerability in the Qualcomm Avtimer driver could
   2221 enable a local malicious application to access data outside of its permission
   2222 levels. This issue is rated as Moderate because it first requires compromising
   2223 a privileged process.</p>
   2224 
   2225 <table>
   2226   <col width="19%">
   2227   <col width="20%">
   2228   <col width="10%">
   2229   <col width="23%">
   2230   <col width="17%">
   2231   <tr>
   2232     <th>CVE</th>
   2233     <th>References</th>
   2234     <th>Severity</th>
   2235     <th>Updated Google devices</th>
   2236     <th>Date reported</th>
   2237   </tr>
   2238   <tr>
   2239     <td>CVE-2016-5346</td>
   2240     <td>A-32551280<br>
   2241         <a 
   2242 href="https://source.codeaurora.org/quic/la//kernel/msm-3.18/commit/?id=6298a474322fb2182f795a622b2faa64abfd8474">
   2243 QC-CR#1097878</a></td>
   2244     <td>Moderate</td>
   2245     <td>Pixel, Pixel XL</td>
   2246     <td>Oct 29, 2016</td>
   2247   </tr>
   2248 </table>
   2249 
   2250 
   2251 <h3 id="id-in-qualcomm-video-driver">Information disclosure vulnerability in
   2252 Qualcomm video driver</h3>
   2253 <p>An information disclosure vulnerability in the Qualcomm video driver could
   2254 enable a local malicious application to access data outside of its permission
   2255 levels. This issue is rated as Moderate because it first requires compromising
   2256 a privileged process.</p>
   2257 
   2258 <table>
   2259   <col width="19%">
   2260   <col width="20%">
   2261   <col width="10%">
   2262   <col width="23%">
   2263   <col width="17%">
   2264   <tr>
   2265     <th>CVE</th>
   2266     <th>References</th>
   2267     <th>Severity</th>
   2268     <th>Updated Google devices</th>
   2269     <th>Date reported</th>
   2270   </tr>
   2271   <tr>
   2272     <td>CVE-2017-6425</td>
   2273     <td>A-32577085<br>
   2274         <a 
   2275 href="https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=ef86560a21fe1f256f6ba772a195201ff202c657">
   2276 QC-CR#1103689</a></td>
   2277     <td>Moderate</td>
   2278     <td>Pixel, Pixel XL</td>
   2279     <td>Oct 29, 2016</td>
   2280   </tr>
   2281 </table>
   2282 
   2283 
   2284 <h3 id="id-in-qualcomm-usb-driver">Information disclosure vulnerability in
   2285 Qualcomm USB driver</h3>
   2286 <p>An information disclosure vulnerability in the Qualcomm USB driver could enable
   2287 a local malicious application to access data outside of its permission levels.
   2288 This issue is rated as Moderate because it first requires compromising a
   2289 privileged process.</p>
   2290 
   2291 <table>
   2292   <col width="19%">
   2293   <col width="20%">
   2294   <col width="10%">
   2295   <col width="23%">
   2296   <col width="17%">
   2297   <tr>
   2298     <th>CVE</th>
   2299     <th>References</th>
   2300     <th>Severity</th>
   2301     <th>Updated Google devices</th>
   2302     <th>Date reported</th>
   2303   </tr>
   2304   <tr>
   2305     <td>CVE-2016-10236</td>
   2306     <td>A-33280689<br>
   2307         <a 
   2308 href="https://source.codeaurora.org/quic/la//kernel/msm-3.18/commit/?id=b8199c2b852f1e23c988e10b8fbb8d34c98b4a1c">
   2309 QC-CR#1102418</a></td>
   2310     <td>Moderate</td>
   2311     <td>Pixel, Pixel XL</td>
   2312     <td>Nov 30, 2016</td>
   2313   </tr>
   2314 </table>
   2315 
   2316 
   2317 <h3 id="id-in-qualcomm-sound-driver">Information disclosure vulnerability in
   2318 Qualcomm sound driver</h3>
   2319 <p>An information disclosure vulnerability in the Qualcomm sound driver could
   2320 enable a local malicious application to access data outside of its permission
   2321 levels. This issue is rated as Moderate because it first requires compromising
   2322 a privileged process.</p>
   2323 
   2324 <table>
   2325   <col width="19%">
   2326   <col width="20%">
   2327   <col width="10%">
   2328   <col width="23%">
   2329   <col width="17%">
   2330   <tr>
   2331     <th>CVE</th>
   2332     <th>References</th>
   2333     <th>Severity</th>
   2334     <th>Updated Google devices</th>
   2335     <th>Date reported</th>
   2336   </tr>
   2337   <tr>
   2338     <td>CVE-2017-0586</td>
   2339     <td>A-33649808<br>
   2340         QC-CR#1097569</td>
   2341     <td>Moderate</td>
   2342     <td>Nexus 5X, Nexus 6, Nexus 6P, Pixel, Pixel XL, Android One</td>
   2343     <td>Dec 13, 2016</td>
   2344   </tr>
   2345 </table>
   2346 
   2347 
   2348 <h3 id="id-in-qualcomm-spmi-driver">Information disclosure vulnerability in
   2349 Qualcomm SPMI driver</h3>
   2350 <p>An information disclosure vulnerability in the Qualcomm SPMI driver could
   2351 enable a local malicious application to access data outside of its permission
   2352 levels. This issue is rated as Moderate because it first requires compromising
   2353 a privileged process.</p>
   2354 
   2355 <table>
   2356   <col width="19%">
   2357   <col width="20%">
   2358   <col width="10%">
   2359   <col width="23%">
   2360   <col width="17%">
   2361   <tr>
   2362     <th>CVE</th>
   2363     <th>References</th>
   2364     <th>Severity</th>
   2365     <th>Updated Google devices</th>
   2366     <th>Date reported</th>
   2367   </tr>
   2368   <tr>
   2369     <td>CVE-2017-6426</td>
   2370     <td>A-33644474<br>
   2371         <a 
   2372 href="https://source.codeaurora.org/quic/la//kernel/msm-3.18/commit/?id=80decd6365deec08c35ecb902a58f9210599b39a">
   2373 QC-CR#1106842</a></td>
   2374     <td>Moderate</td>
   2375     <td>Pixel, Pixel XL</td>
   2376     <td>Dec 14, 2016</td>
   2377   </tr>
   2378 </table>
   2379 
   2380 
   2381 <h3 id="id-in-nvidia-crypto-driver">Information disclosure vulnerability in
   2382 NVIDIA crypto driver</h3>
   2383 <p>An information disclosure vulnerability in the NVIDIA crypto driver could
   2384 enable a local malicious application to access data outside of its permission
   2385 levels. This issue is rated as Moderate because it first requires compromising
   2386 a privileged process.</p>
   2387 
   2388 <table>
   2389   <col width="19%">
   2390   <col width="20%">
   2391   <col width="10%">
   2392   <col width="23%">
   2393   <col width="17%">
   2394   <tr>
   2395     <th>CVE</th>
   2396     <th>References</th>
   2397     <th>Severity</th>
   2398     <th>Updated Google devices</th>
   2399     <th>Date reported</th>
   2400   </tr>
   2401   <tr>
   2402     <td>CVE-2017-0328</td>
   2403     <td>A-33898322*<br>
   2404         N-CVE-2017-0328</td>
   2405     <td>Moderate</td>
   2406     <td>None**</td>
   2407     <td>Dec 24, 2016</td>
   2408   </tr>
   2409   <tr>
   2410     <td>CVE-2017-0330</td>
   2411     <td>A-33899858*<br>
   2412         N-CVE-2017-0330</td>
   2413     <td>Moderate</td>
   2414     <td>None**</td>
   2415     <td>Dec 24, 2016</td>
   2416   </tr>
   2417 </table>
   2418 <p>* The patch for this issue is not publicly available. The update is contained
   2419 in the latest binary drivers for Nexus devices available from the
   2420 <a href="https://developers.google.com/android/nexus/drivers">
   2421 Google Developer site</a>.</p>
   2422 <p>** Supported Google devices on Android 7.0 or later that have installed all
   2423 available updates are not affected by this vulnerability.</p>
   2424 
   2425 
   2426 <h3 id="vulnerabilities-in-qualcomm-components-2">Vulnerabilities in Qualcomm
   2427 components</h3>
   2428 <p>These vulnerabilities affecting Qualcomm components were released as part of
   2429 Qualcomm AMSS security bulletins between 20142016. They are included in this
   2430 Android security bulletin to associate their fixes with an Android security
   2431 patch level. </p>
   2432 
   2433 <table>
   2434   <col width="19%">
   2435   <col width="20%">
   2436   <col width="10%">
   2437   <col width="23%">
   2438   <col width="17%">
   2439   <tr>
   2440     <th>CVE</th>
   2441     <th>References</th>
   2442     <th>Severity</th>
   2443     <th>Updated Google devices</th>
   2444     <th>Date reported</th>
   2445   </tr>
   2446   <tr>
   2447     <td>CVE-2014-9931</td>
   2448     <td>A-35445101**<br>
   2449         QC-CR#612410</td>
   2450     <td>Critical</td>
   2451     <td>None**</td>
   2452     <td>Qualcomm internal</td>
   2453   </tr>
   2454   <tr>
   2455     <td>CVE-2014-9932</td>
   2456     <td>A-35434683**<br>
   2457         QC-CR#626734</td>
   2458     <td>Critical</td>
   2459     <td>Pixel, Pixel XL</td>
   2460     <td>Qualcomm internal</td>
   2461   </tr>
   2462   <tr>
   2463     <td>CVE-2014-9933</td>
   2464     <td>A-35442512<br>
   2465         QC-CR#675463</td>
   2466     <td>Critical</td>
   2467     <td>None**</td>
   2468     <td>Qualcomm internal</td>
   2469   </tr>
   2470   <tr>
   2471     <td>CVE-2014-9934</td>
   2472     <td>A-35439275**<br>
   2473         QC-CR#658249</td>
   2474     <td>Critical</td>
   2475     <td>None**</td>
   2476     <td>Qualcomm internal</td>
   2477   </tr>
   2478   <tr>
   2479     <td>CVE-2014-9935</td>
   2480     <td>A-35444951**<br>
   2481         QC-CR#717626</td>
   2482     <td>Critical</td>
   2483     <td>None**</td>
   2484     <td>Qualcomm internal</td>
   2485   </tr>
   2486   <tr>
   2487     <td>CVE-2014-9936</td>
   2488     <td>A-35442420**<br>
   2489         QC-CR#727389</td>
   2490     <td>Critical</td>
   2491     <td>None**</td>
   2492     <td>Qualcomm internal</td>
   2493   </tr>
   2494   <tr>
   2495     <td>CVE-2014-9937</td>
   2496     <td>A-35445102**<br>
   2497         QC-CR#734095</td>
   2498     <td>Critical</td>
   2499     <td>None**</td>
   2500     <td>Qualcomm internal</td>
   2501   </tr>
   2502   <tr>
   2503     <td>CVE-2015-8995</td>
   2504     <td>A-35445002**<br>
   2505         QC-CR#733690</td>
   2506     <td>Critical</td>
   2507     <td>None**</td>
   2508     <td>Qualcomm internal</td>
   2509   </tr>
   2510   <tr>
   2511     <td>CVE-2015-8996</td>
   2512     <td>A-35444658**<br>
   2513         QC-CR#734698</td>
   2514     <td>Critical</td>
   2515     <td>None**</td>
   2516     <td>Qualcomm internal</td>
   2517   </tr>
   2518   <tr>
   2519     <td>CVE-2015-8997</td>
   2520     <td>A-35432947**<br>
   2521         QC-CR#734707</td>
   2522     <td>Critical</td>
   2523     <td>None**</td>
   2524     <td>Qualcomm internal</td>
   2525   </tr>
   2526   <tr>
   2527     <td>CVE-2015-8998</td>
   2528     <td>A-35441175**<br>
   2529         QC-CR#735337</td>
   2530     <td>Critical</td>
   2531     <td>None**</td>
   2532     <td>Qualcomm internal</td>
   2533   </tr>
   2534   <tr>
   2535     <td>CVE-2015-8999</td>
   2536     <td>A-35445401**<br>
   2537         QC-CR#736119</td>
   2538     <td>Critical</td>
   2539     <td>None**</td>
   2540     <td>Qualcomm internal</td>
   2541   </tr>
   2542   <tr>
   2543     <td>CVE-2015-9000</td>
   2544     <td>A-35441076**<br>
   2545         QC-CR#740632</td>
   2546     <td>Critical</td>
   2547     <td>None**</td>
   2548     <td>Qualcomm internal</td>
   2549   </tr>
   2550   <tr>
   2551     <td>CVE-2015-9001</td>
   2552     <td>A-35445400**<br>
   2553         QC-CR#736083</td>
   2554     <td>Critical</td>
   2555     <td>None**</td>
   2556     <td>Qualcomm internal</td>
   2557   </tr>
   2558   <tr>
   2559     <td>CVE-2015-9002</td>
   2560     <td>A-35442421**<br>
   2561         QC-CR#748428</td>
   2562     <td>Critical</td>
   2563     <td>None**</td>
   2564     <td>Qualcomm internal</td>
   2565   </tr>
   2566   <tr>
   2567     <td>CVE-2015-9003</td>
   2568     <td>A-35440626**<br>
   2569         QC-CR#749215</td>
   2570     <td>Critical</td>
   2571     <td>None**</td>
   2572     <td>Qualcomm internal</td>
   2573   </tr>
   2574   <tr>
   2575     <td>CVE-2016-10242</td>
   2576     <td>A-35434643**<br>
   2577         QC-CR#985139</td>
   2578     <td>Critical</td>
   2579     <td>None**</td>
   2580     <td>Qualcomm internal</td>
   2581   </tr>
   2582 </table>
   2583 <p>* The severity rating for these vulnerabilities was determined by the vendor.</p>
   2584 <p>* The patch for this issue is not publicly available. The update is contained
   2585 in the latest binary drivers for Nexus devices available from the
   2586 <a href="https://developers.google.com/android/nexus/drivers">
   2587 Google Developer site</a>.</p>
   2588 <p>*** Supported Google devices on Android 7.0 or later that have installed all
   2589 available updates are not affected by this vulnerability.</p>
   2590 
   2591 <h2 id="common-questions-and-answers">Common Questions and Answers</h2>
   2592 <p>This section answers common questions that may occur after reading this
   2593 bulletin.</p>
   2594 <p><strong>1. How do I determine if my device is updated to address these issues?</strong></p>
   2595 <p>To learn how to check a device's security patch level, read the instructions on
   2596 the <a href="https://support.google.com/pixelphone/answer/4457705#pixel_phones&nexus_devices">Pixel
   2597 and Nexus update schedule</a>.</p>
   2598 <ul>
   2599   <li>Security patch levels of 2017-04-01 or later address all issues associated
   2600   with the 2017-04-01 security patch level.</li>
   2601   <li>Security patch levels of 2017-04-05 or later address all issues associated
   2602   with the 2017-04-05 security patch level and all previous patch levels.</li>
   2603 </ul>
   2604 <p>Device manufacturers that include these updates should set the patch string
   2605 level to:</p>
   2606 <ul>
   2607   <li>[ro.build.version.security_patch]:[2017-04-01]</li>
   2608   <li>[ro.build.version.security_patch]:[2017-04-05]</li>
   2609 </ul>
   2610 
   2611 <p><strong>2. Why does this bulletin have two security patch levels?</strong></p>
   2612 <p>This bulletin has two security patch levels so that Android partners have the
   2613 flexibility to fix a subset of vulnerabilities that are similar across all
   2614 Android devices more quickly. Android partners are encouraged to fix all issues
   2615 in this bulletin and use the latest security patch level.</p>
   2616 <ul>
   2617   <li>Devices that use the April 01, 2017 security patch level must include all
   2618   issues associated with that security patch level, as well as fixes for all
   2619   issues reported in previous security bulletins.</li>
   2620   <li>Devices that use the security patch level of April 05, 2017 or newer must
   2621   include all applicable patches in this (and previous) security
   2622   bulletins.</li>
   2623 </ul>
   2624 <p>Partners are encouraged to bundle the fixes for all issues they are addressing
   2625 in a single update.</p>
   2626 <p><strong>3. How do I determine which Google devices are affected by each
   2627 issue?</strong></p>
   2628 <p>In the <a
   2629 href="#2017-04-01-details">2017-04-01</a> and
   2630 <a href="#2017-04-05-details">2017-04-05</a>
   2631 security vulnerability details sections, each table has an <em>Updated Google
   2632 devices</em> column that covers the range of affected Google devices updated for
   2633 each issue. This column has a few options:</p>
   2634 <ul>
   2635   <li><strong>All Google devices</strong>: If an issue affects All and Pixel
   2636   devices, the table will have "All" in the <em>Updated Google devices</em>
   2637   column. "All" encapsulates the following <a
   2638   href="https://support.google.com/pixelphone/answer/4457705#pixel_phones&nexus_devices">supported
   2639   devices</a>: Nexus 5X, Nexus 6, Nexus 6P, Nexus 9, Android One,
   2640   Nexus Player, Pixel C, Pixel, and Pixel XL.</li>
   2641   <li><strong>Some Google devices</strong>: If an issue doesn't affect all Google
   2642   devices, the affected Google devices are listed in the <em>Updated Google
   2643   devices</em> column.</li>
   2644   <li><strong>No Google devices</strong>: If no Google devices running Android 7.0
   2645   are affected by the issue, the table will have "None" in the <em>Updated Google
   2646   devices</em> column. </li>
   2647 </ul>
   2648 <p><strong>4. What do the entries in the references column map to?</strong></p>
   2649 <p>Entries under the <em>References</em> column of the vulnerability details table
   2650 may contain a prefix identifying the organization to which the reference value
   2651 belongs. These prefixes map as follows:</p>
   2652 <table>
   2653   <tr>
   2654    <th>Prefix</th>
   2655    <th>Reference</th>
   2656   </tr>
   2657   <tr>
   2658    <td>A-</td>
   2659    <td>Android bug ID</td>
   2660   </tr>
   2661   <tr>
   2662    <td>QC-</td>
   2663    <td>Qualcomm reference number</td>
   2664   </tr>
   2665   <tr>
   2666    <td>M-</td>
   2667    <td>MediaTek reference number</td>
   2668   </tr>
   2669   <tr>
   2670    <td>N-</td>
   2671    <td>NVIDIA reference number</td>
   2672   </tr>
   2673   <tr>
   2674    <td>B-</td>
   2675    <td>Broadcom reference number</td>
   2676   </tr>
   2677 </table>
   2678 
   2679 <h2 id="revisions">Revisions</h2>
   2680 <ul>
   2681   <li>April 03, 2017: Bulletin published.</li>
   2682   <li>April 05, 2017: Bulletin revised to include AOSP links.</li>
   2683   <li>April 21, 2017: Attribution for CVE-2016-10231 and CVE-2017-0586 corrected.</li>
   2684   <li>April 27, 2017: CVE-2017-0540 removed from bulletin.</li>
   2685 </ul>
   2686 
   2687 </body>
   2688 </html>
   2689