Home | History | Annotate | Download | only in bulletin
      1 <html devsite>
      2   <head>
      3     <title>Android Security BulletinMay 2017</title>
      4     <meta name="project_path" value="/_project.yaml" />
      5     <meta name="book_path" value="/_book.yaml" />
      6   </head>
      7   <body>
      8   <!--
      9       Copyright 2017 The Android Open Source Project
     10 
     11       Licensed under the Apache License, Version 2.0 (the "License");
     12       you may not use this file except in compliance with the License.
     13       You may obtain a copy of the License at
     14 
     15           http://www.apache.org/licenses/LICENSE-2.0
     16 
     17       Unless required by applicable law or agreed to in writing, software
     18       distributed under the License is distributed on an "AS IS" BASIS,
     19       WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
     20       See the License for the specific language governing permissions and
     21       limitations under the License.
     22   -->
     23   
     24 
     25 <p><em>Published May 01, 2017 | Updated May 02, 2017</em></p>
     26 
     27 <p>The Android Security Bulletin contains details of security vulnerabilities
     28 affecting Android devices. Alongside the bulletin, we have released a security
     29 update to Nexus devices through an over-the-air (OTA) update. The Google device
     30 firmware images have also been released to the <a
     31 href="https://developers.google.com/android/nexus/images">Google Developer
     32 site</a>. Security patch levels of May 05, 2017 or later address all of these
     33 issues. Refer to the <a
     34 href="https://support.google.com/pixelphone/answer/4457705#pixel_phones&nexus_devices">Pixel
     35 and Nexus update schedule</a> to learn how to check a device's security patch
     36 level.</p>
     37 
     38 <p>Partners were notified of the issues described in the bulletin on April 03, 2017
     39 or earlier. Source code patches for these issues have been released to the
     40 Android Open Source Project (AOSP) repository and linked from this bulletin.
     41 This bulletin also includes links to patches outside of AOSP.</p>
     42 
     43 <p>The most severe of these issues is a Critical security vulnerability that could
     44 enable remote code execution on an affected device through multiple methods such
     45 as email, web browsing, and MMS when processing media files. The <a
     46 href="/security/overview/updates-resources.html#severity">severity
     47 assessment</a> is based on the effect that exploiting the vulnerability would
     48 possibly have on an affected device, assuming the platform and service
     49 mitigations are disabled for development purposes or if successfully bypassed.</p>
     50 
     51 <p>We have had no reports of active customer exploitation or abuse of these newly
     52 reported issues. Refer to the <a
     53 href="#mitigations">Android and Google service
     54 mitigations</a> section for details on the <a
     55 href="/security/enhancements/index.html">Android
     56 security platform protections</a> and service protections such as <a
     57 href="https://developer.android.com/training/safetynet/index.html">SafetyNet</a>,
     58 which improve the security of the Android platform.</p>
     59 
     60 <p>We encourage all customers to accept these updates to their devices.</p>
     61 <h2 id="announcements">Announcements</h2>
     62 <ul>
     63 <li>This bulletin has two security patch level strings to provide Android
     64 partners with the flexibility to more quickly fix a subset of vulnerabilities
     65 that are similar across all Android devices. See <a
     66 href="#common-questions-and-answers">Common questions and answers</a> for
     67 additional information:
     68  <ul>
     69  <li><strong>2017-05-01</strong>: Partial security patch level string. This
     70 security patch level string indicates that all issues associated with 2017-05-01
     71 (and all previous security patch level strings) are addressed.</li>
     72  <li><strong>2017-05-05</strong>: Complete security patch level string. This
     73 security patch level string indicates that all issues associated with 2017-05-01
     74 and 2017-05-05 (and all previous security patch level strings) are addressed.</li>
     75 </ul>
     76 </li>
     77 <li>Supported Google devices will receive a single OTA update with the May 05,
     78 2017 security patch level.</li>
     79 </ul>
     80 
     81 <h2 id="mitigations">Android and Google Service Mitigations</h2>
     82 
     83 <p>This is a summary of the mitigations provided by the <a
     84 href="/security/enhancements/index.html">Android
     85 security platform</a> and service protections such as SafetyNet. These
     86 capabilities reduce the likelihood that security vulnerabilities could be
     87 successfully exploited on Android.</p>
     88 
     89 <ul>
     90 <li>Exploitation for many issues on Android is made more difficult by
     91 enhancements in newer versions of the Android platform. We encourage all users
     92 to update to the latest version of Android where possible.</li>
     93 <li>The Android Security team actively monitors for abuse with <a
     94 href="/security/reports/Google_Android_Security_2016_Report_Final.pdf">Verify
     95 Apps and SafetyNet</a>, which are designed to warn users about <a
     96 href="/security/reports/Google_Android_Security_PHA_classifications.pdf">Potentially
     97 Harmful Applications</a>. Verify Apps is enabled by default on devices with <a
     98 href="http://www.android.com/gms">Google Mobile Services</a> and is especially
     99 important for users who install applications from outside of Google Play. Device
    100 rooting tools are prohibited within Google Play, but Verify Apps warns users
    101 when they attempt to install a detected rooting applicationno matter where it
    102 comes from. Additionally, Verify Apps attempts to identify and block
    103 installation of known malicious applications that exploit a privilege escalation
    104 vulnerability. If such an application has already been installed, Verify Apps
    105 will notify the user and attempt to remove the detected application.</li>
    106 <li>As appropriate, Google Hangouts and Messenger applications do not
    107 automatically pass media to processes such as Mediaserver.</li>
    108 </ul>
    109 
    110 <h2 id="acknowledgements">Acknowledgements</h2>
    111 
    112 <p>We would like to thank these researchers for their contributions:</p>
    113 <ul>
    114 <li>ADlab of Venustech: CVE-2017-0630</li>
    115 <li>Di Shen (<a href="https://twitter.com/returnsme">@returnsme</a>) of
    116 KeenLab (<a href="https://twitter.com/keen_lab">@keen_lab</a>), Tencent:
    117 CVE-2016-10287</li>
    118 <li>Ecular Xu () of Trend Micro: CVE-2017-0599, CVE-2017-0635</li>
    119 <li>En He (<a href="https://twitter.com/heeeeen4x">@heeeeen4x</a>) and Bo Liu of
    120 <a href="http://www.ms509.com">MS509Team</a>: CVE-2017-0601</li>
    121 <li>Ethan Yonker of <a href="https://twrp.me/">Team Win Recovery Project</a>:
    122 CVE-2017-0493</li>
    123 <li>Gengjia Chen (<a href="https://twitter.com/chengjia4574">@chengjia4574</a>)
    124 and <a href="http://weibo.com/jfpan">pjf</a> of IceSword Lab, Qihoo 360
    125 Technology Co. Ltd: CVE-2016-10285, CVE-2016-10288, CVE-2016-10290,
    126 CVE-2017-0624, CVE-2017-0616, CVE-2017-0617, CVE-2016-10294, CVE-2016-10295,
    127 CVE-2016-10296</li>
    128 <li>godzheng ( <a
    129 href="https://twitter.com/virtualseekers">@VirtualSeekers</a>) of Tencent PC
    130 Manager: CVE-2017-0602</li>
    131 <li><a href="https://www.linkedin.com/in/g%C3%BCliz-seray-tuncay-952a1b9/">Gliz
    132 Seray Tuncay</a> of the <a
    133 href="http://tuncay2.web.engr.illinois.edu">University of Illinois at
    134 Urbana-Champaign</a>: CVE-2017-0593</li>
    135 <li>Hao Chen and Guang Gong of Alpha Team, Qihoo 360 Technology Co. Ltd:
    136 CVE-2016-10283</li>
    137 <li>Juhu Nie, Yang Cheng, Nan Li, and Qiwu Huang of Xiaomi Inc: CVE-2016-10276</li>
    138 <li><a href="https://github.com/michalbednarski">Micha Bednarski</a>:
    139 CVE-2017-0598</li>
    140 <li>Nathan Crandall (<a href="https://twitter.com/natecray">@natecray</a>) of
    141 Tesla's Product Security Team: CVE-2017-0331, CVE-2017-0606</li>
    142 <li><a href="mailto:jiych.guru (a] gmail.com">Niky1235</a> (<a
    143 href="https://twitter.com/jiych_guru">@jiych_guru</a>): CVE-2017-0603</li>
    144 <li>Peng Xiao, Chengming Yang, Ning You, Chao Yang, and Yang song of Alibaba
    145 Mobile Security Group: CVE-2016-10281, CVE-2016-10280</li>
    146 <li>Roee Hay (<a href="https://twitter.com/roeehay">@roeehay</a>) of <a
    147 href="https://alephsecurity.com/">Aleph Research</a>: CVE-2016-10277</li>
    148 <li><a href="mailto:sbauer (a] plzdonthack.me">Scott Bauer</a> (<a
    149 href="https://twitter.com/ScottyBauer1">@ScottyBauer1</a>): CVE-2016-10274</li>
    150 <li><a href="mailto:segfault5514 (a] gmail.com">Tong Lin</a>, <a
    151 href="mailto:computernik (a] gmail.com">Yuan-Tsung Lo</a>, and Xuxian Jiang of <a
    152 href="http://c0reteam.org">C0RE Team</a>: CVE-2016-10291</li>
    153 <li>Vasily Vasiliev: CVE-2017-0589</li>
    154 <li>V.E.O (<a href="https://twitter.com/vysea">@VYSEa</a>) of <a
    155 href="http://blog.trendmicro.com/trendlabs-security-intelligence/category/mobile">Mobile
    156 Threat Response Team</a>, <a href="http://www.trendmicro.com">Trend Micro</a>:
    157 CVE-2017-0590, CVE-2017-0587, CVE-2017-0600</li>
    158 <li>Xiling Gong of Tencent Security Platform Department: CVE-2017-0597</li>
    159 <li>Xingyuan Lin of 360 Marvel Team: CVE-2017-0627</li>
    160 <li>Yong Wang () (<a
    161 href="https://twitter.com/ThomasKing2014">@ThomasKing2014</a>) of Alibaba Inc:
    162 CVE-2017-0588</li>
    163 <li>Yonggang Guo (<a href="https://twitter.com/guoygang">@guoygang</a>) of
    164 IceSword Lab, Qihoo 360 Technology Co. Ltd: CVE-2016-10289, CVE-2017-0465</li>
    165 <li>Yu Pan of Vulpecker Team, Qihoo 360 Technology Co. Ltd: CVE-2016-10282,
    166 CVE-2017-0615</li>
    167 <li>Yu Pan and Peide Zhang of Vulpecker Team, Qihoo 360 Technology Co. Ltd:
    168 CVE-2017-0618, CVE-2017-0625</li>
    169 </ul>
    170 
    171 <h2 id="2017-05-01-details">2017-05-01 security patch level-Vulnerability
    172 details</h2>
    173 
    174 <p>In the sections below, we provide details for each of the security
    175 vulnerabilities that apply to the 2017-05-01 patch level. There is a description
    176 of the issue, a severity rationale, and a table with the CVE, associated
    177 references, severity, updated Google devices, updated AOSP versions (where
    178 applicable), and date reported. When available, we will link the public change
    179 that addressed the issue to the bug ID, like the AOSP change list. When multiple
    180 changes relate to a single bug, additional references are linked to numbers
    181 following the bug ID.</p>
    182 
    183 
    184 <h3 id="rce-in-mediaserver">Remote code execution vulnerability in
    185 Mediaserver</h3>
    186 
    187 <p>A remote code execution vulnerability in Mediaserver could enable an attacker
    188 using a specially crafted file to cause memory corruption during media file and
    189 data processing. This issue is rated as Critical due to the possibility of
    190 remote code execution within the context of the Mediaserver process.</p>
    191 
    192 <table>
    193   <col width="18%">
    194   <col width="17%">
    195   <col width="10%">
    196   <col width="19%">
    197   <col width="18%">
    198   <col width="17%">
    199   <tr>
    200     <th>CVE</th>
    201     <th>References</th>
    202     <th>Severity</th>
    203     <th>Updated Google devices</th>
    204     <th>Updated AOSP versions</th>
    205     <th>Date reported</th>
    206   </tr>
    207   <tr>
    208     <td>CVE-2017-0587</td>
    209     <td><a href="https://android.googlesource.com/platform/external/libmpeg2/+/a86eb798d077b9b25c8f8c77e3c02c2f287c1ce7">A-35219737</a></td>
    210     <td>Critical</td>
    211     <td>All</td>
    212     <td>6.0, 6.0.1, 7.0, 7.1.1, 7.1.2</td>
    213     <td>Jan 4, 2017</td>
    214   </tr>
    215   <tr>
    216     <td>CVE-2017-0588</td>
    217     <td><a href="https://android.googlesource.com/platform/frameworks/av/+/6f1d990ce0f116a205f467d9eb2082795e33872b">A-34618607</a></td>
    218     <td>Critical</td>
    219     <td>All</td>
    220     <td>4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2</td>
    221     <td>Jan 21, 2017</td>
    222   </tr>
    223   <tr>
    224     <td>CVE-2017-0589</td>
    225     <td><a href="https://android.googlesource.com/platform/external/libhevc/+/bcfc7124f6ef9f1ec128fb2e90de774a5b33d199">A-34897036</a></td>
    226     <td>Critical</td>
    227     <td>All</td>
    228     <td>5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2</td>
    229     <td>Feb 1, 2017</td>
    230   </tr>
    231   <tr>
    232     <td>CVE-2017-0590</td>
    233     <td><a href="https://android.googlesource.com/platform/external/libhevc/+/45c97f878bee15cd97262fe7f57ecea71990fed7">A-35039946</a></td>
    234     <td>Critical</td>
    235     <td>All</td>
    236     <td>5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2</td>
    237     <td>Feb 6, 2017</td>
    238   </tr>
    239   <tr>
    240     <td>CVE-2017-0591</td>
    241     <td><a href="https://android.googlesource.com/platform/external/libavc/+/5c3fd5d93a268abb20ff22f26009535b40db3c7d">A-34097672</a></td>
    242     <td>Critical</td>
    243     <td>All</td>
    244     <td>6.0, 6.0.1, 7.0, 7.1.1, 7.1.2</td>
    245     <td>Google internal</td>
    246   </tr>
    247   <tr>
    248     <td>CVE-2017-0592</td>
    249     <td><a href="https://android.googlesource.com/platform/frameworks/av/+/acc192347665943ca674acf117e4f74a88436922">A-34970788</a></td>
    250     <td>Critical</td>
    251     <td>All</td>
    252     <td>4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2</td>
    253     <td>Google internal</td>
    254   </tr>
    255 </table>
    256 
    257 
    258 <h3 id="eop-in-framework-apis">Elevation of privilege vulnerability in
    259 Framework APIs</h3>
    260 
    261 <p>An elevation of privilege vulnerability in the Framework APIs could enable a
    262 local malicious application to obtain access to custom permissions. This issue
    263 is rated as High because it is a general bypass for operating system
    264 protections that isolate application data from other applications.</p>
    265 
    266 <table>
    267   <col width="18%">
    268   <col width="17%">
    269   <col width="10%">
    270   <col width="19%">
    271   <col width="18%">
    272   <col width="17%">
    273   <tr>
    274     <th>CVE</th>
    275     <th>References</th>
    276     <th>Severity</th>
    277     <th>Updated Google devices</th>
    278     <th>Updated AOSP versions</th>
    279     <th>Date reported</th>
    280   </tr>
    281   <tr>
    282     <td>CVE-2017-0593</td>
    283     <td><a href="https://android.googlesource.com/platform/frameworks/base/+/78efbc95412b8efa9a44d573f5767ae927927d48">A-34114230</a></td>
    284     <td>High</td>
    285     <td>All</td>
    286     <td>6.0, 6.0.1, 7.0, 7.1.1, 7.1.2</td>
    287     <td>Jan 5, 2017</td>
    288   </tr>
    289 </table>
    290 
    291 
    292 <h3 id="eop-in-mediaserver">Elevation of privilege vulnerability in
    293 Mediaserver</h3>
    294 
    295 <p>An elevation of privilege vulnerability in Mediaserver could enable a local
    296 malicious application to execute arbitrary code within the context of a
    297 privileged process. This issue is rated as High because it could be used to
    298 gain local access to elevated capabilities, which are not normally accessible
    299 to a third-party application.</p>
    300 
    301 <table>
    302   <col width="18%">
    303   <col width="17%">
    304   <col width="10%">
    305   <col width="19%">
    306   <col width="18%">
    307   <col width="17%">
    308   <tr>
    309     <th>CVE</th>
    310     <th>References</th>
    311     <th>Severity</th>
    312     <th>Updated Google devices</th>
    313     <th>Updated AOSP versions</th>
    314     <th>Date reported</th>
    315   </tr>
    316   <tr>
    317     <td>CVE-2017-0594</td>
    318     <td><a href="https://android.googlesource.com/platform/frameworks/av/+/594bf934384920618d2b6ce0bcda1f60144cb3eb">A-34617444</a></td>
    319     <td>High</td>
    320     <td>All</td>
    321     <td>4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2</td>
    322     <td>Jan 22, 2017</td>
    323   </tr>
    324   <tr>
    325     <td>CVE-2017-0595</td>
    326     <td><a href="https://android.googlesource.com/platform/frameworks/av/+/5443b57cc54f2e46b35246637be26a69e9f493e1">A-34705519</a></td>
    327     <td>High</td>
    328     <td>All</td>
    329     <td>4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1</td>
    330     <td>Jan 24, 2017</td>
    331   </tr>
    332   <tr>
    333     <td>CVE-2017-0596</td>
    334     <td><a href="https://android.googlesource.com/platform/frameworks/av/+/5443b57cc54f2e46b35246637be26a69e9f493e1">A-34749392</a></td>
    335     <td>High</td>
    336     <td>All</td>
    337     <td>4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1</td>
    338     <td>Jan 24, 2017</td>
    339   </tr>
    340 </table>
    341 
    342 
    343 <h3 id="eop-in-audioserver">Elevation of privilege vulnerability in
    344 Audioserver</h3>
    345 
    346 <p>An elevation of privilege vulnerability in Audioserver could enable a local
    347 malicious application to execute arbitrary code within the context of a
    348 privileged process. This issue is rated as High because it could be used to
    349 gain local access to elevated capabilities, which are not normally accessible
    350 to a third-party application.</p>
    351 
    352 <table>
    353   <col width="18%">
    354   <col width="17%">
    355   <col width="10%">
    356   <col width="19%">
    357   <col width="18%">
    358   <col width="17%">
    359   <tr>
    360     <th>CVE</th>
    361     <th>References</th>
    362     <th>Severity</th>
    363     <th>Updated Google devices</th>
    364     <th>Updated AOSP versions</th>
    365     <th>Date reported</th>
    366   </tr>
    367   <tr>
    368     <td>CVE-2017-0597</td>
    369     <td><a href="https://android.googlesource.com/platform/frameworks/av/+/a9188f89179a7edd301abaf37d644adf5d647a04">A-34749571</a></td>
    370     <td>High</td>
    371     <td>All</td>
    372     <td>4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2</td>
    373     <td>Jan 25, 2017</td>
    374   </tr>
    375 </table>
    376 
    377 
    378 <h3 id="id-in-framework-apis">Information disclosure vulnerability in Framework
    379 APIs</h3>
    380 
    381 <p>An information disclosure vulnerability in the Framework APIs could enable a
    382 local malicious application to bypass operating system protections that isolate
    383 application data from other applications. This issue is rated as High because
    384 it could be used to gain access to data that the application does not have
    385 access to.</p>
    386 
    387 <table>
    388   <col width="18%">
    389   <col width="17%">
    390   <col width="10%">
    391   <col width="19%">
    392   <col width="18%">
    393   <col width="17%">
    394   <tr>
    395     <th>CVE</th>
    396     <th>References</th>
    397     <th>Severity</th>
    398     <th>Updated Google devices</th>
    399     <th>Updated AOSP versions</th>
    400     <th>Date reported</th>
    401   </tr>
    402   <tr>
    403     <td>CVE-2017-0598</td>
    404     <td><a href="https://android.googlesource.com/platform/frameworks/base/+/4e110ab20bb91e945a17c6e166e14e2da9608f08">A-34128677</a>
    405     [<a href="https://android.googlesource.com/platform/frameworks/base/+/d42e1204d5dddb78ec9d20d125951b59a8344f40">2</a>]</td>
    406     <td>High</td>
    407     <td>All</td>
    408     <td>4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2</td>
    409     <td>Jan 6, 2017</td>
    410   </tr>
    411 </table>
    412 
    413 
    414 <h3 id="dos-in-mediaserver">Denial of service vulnerability in Mediaserver</h3>
    415 
    416 <p>A remote denial of service vulnerability in Mediaserver could enable an
    417 attacker to use a specially crafted file to cause a device hang or reboot. This
    418 issue is rated as High severity due to the possibility of remote denial of
    419 service.</p>
    420 
    421 <table>
    422   <col width="18%">
    423   <col width="17%">
    424   <col width="10%">
    425   <col width="19%">
    426   <col width="18%">
    427   <col width="17%">
    428   <tr>
    429     <th>CVE</th>
    430     <th>References</th>
    431     <th>Severity</th>
    432     <th>Updated Google devices</th>
    433     <th>Updated AOSP versions</th>
    434     <th>Date reported</th>
    435   </tr>
    436   <tr>
    437     <td>CVE-2017-0599</td>
    438     <td><a href="https://android.googlesource.com/platform/external/libhevc/+/a1424724a00d62ac5efa0e27953eed66850d662f">A-34672748</a></td>
    439     <td>High</td>
    440     <td>All</td>
    441     <td>6.0, 6.0.1, 7.0, 7.1.1, 7.1.2</td>
    442     <td>Jan 23, 2017</td>
    443   </tr>
    444   <tr>
    445     <td>CVE-2017-0600</td>
    446     <td><a href="https://android.googlesource.com/platform/frameworks/av/+/961e5ac5788b52304e64b9a509781beaf5201fb0">A-35269635</a></td>
    447     <td>High</td>
    448     <td>All</td>
    449     <td>4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2</td>
    450     <td>Feb 10, 2017</td>
    451   </tr>
    452 </table>
    453 
    454 
    455 <h3 id="eop-in-bluetooth">Elevation of privilege vulnerability in
    456 Bluetooth</h3>
    457 
    458 <p>An Elevation of Privilege vulnerability in Bluetooth could potentially enable a
    459 local malicious application to accept harmful files shared via bluetooth
    460 without user permission. This issue is rated as Moderate due to local bypass of
    461 user interaction requirements. </p>
    462 
    463 <table>
    464   <col width="18%">
    465   <col width="17%">
    466   <col width="10%">
    467   <col width="19%">
    468   <col width="18%">
    469   <col width="17%">
    470   <tr>
    471     <th>CVE</th>
    472     <th>References</th>
    473     <th>Severity</th>
    474     <th>Updated Google devices</th>
    475     <th>Updated AOSP versions</th>
    476     <th>Date reported</th>
    477   </tr>
    478   <tr>
    479     <td>CVE-2017-0601</td>
    480     <td><a href="https://android.googlesource.com/platform/frameworks/base/+/667d2cbe3eb1450f273a4f6595ccef35e1f0fe4b">A-35258579</a></td>
    481     <td>Moderate</td>
    482     <td>All</td>
    483     <td>7.0, 7.1.1, 7.1.2</td>
    484     <td>Feb 9, 2017</td>
    485   </tr>
    486 </table>
    487 
    488 
    489 <h3 id="id-in-file-based-encryption">Information disclosure vulnerability in
    490 File-Based Encryption</h3>
    491 
    492 <p>An information disclosure vulnerability in File-Based Encryption could enable a
    493 local malicious attacker to bypass operating system protections for the lock
    494 screen. This issue is rated as Moderate due to the possibility of bypassing the
    495 lock screen.</p>
    496 
    497 <table>
    498   <col width="18%">
    499   <col width="17%">
    500   <col width="10%">
    501   <col width="19%">
    502   <col width="18%">
    503   <col width="17%">
    504   <tr>
    505     <th>CVE</th>
    506     <th>References</th>
    507     <th>Severity</th>
    508     <th>Updated Google devices</th>
    509     <th>Updated AOSP versions</th>
    510     <th>Date reported</th>
    511   </tr>
    512   <tr>
    513     <td>CVE-2017-0493</td>
    514     <td><a href="https://android.googlesource.com/platform/frameworks/base/+/e4cefbf4fce458489b5f1bebc79dfaf566bcc5d5">A-32793550</a>
    515     [<a href="https://android.googlesource.com/platform/frameworks/base/+/f806d65e615b942c268a5f68d44bde9d55634972">2</a>]</td>
    516     <td>Moderate</td>
    517     <td>All</td>
    518     <td>7.0, 7.1.1</td>
    519     <td>Nov 9, 2016</td>
    520   </tr>
    521 </table>
    522 
    523 
    524 <h3 id="id-in-bluetooth">Information disclosure vulnerability in Bluetooth</h3>
    525 
    526 <p>An information disclosure vulnerability in Bluetooth could allow a local
    527 malicious application to bypass operating system protections that isolate
    528 application data from other applications. This issue is rated as Moderate due
    529 to details specific to the vulnerability.</p>
    530 
    531 <table>
    532   <col width="18%">
    533   <col width="17%">
    534   <col width="10%">
    535   <col width="19%">
    536   <col width="18%">
    537   <col width="17%">
    538   <tr>
    539     <th>CVE</th>
    540     <th>References</th>
    541     <th>Severity</th>
    542     <th>Updated Google devices</th>
    543     <th>Updated AOSP versions</th>
    544     <th>Date reported</th>
    545   </tr>
    546   <tr>
    547     <td>CVE-2017-0602</td>
    548     <td><a href="https://android.googlesource.com/platform/system/bt/+/a4875a49404c544134df37022ae587a4a3321647">A-34946955</a></td>
    549     <td>Moderate</td>
    550     <td>All</td>
    551     <td>4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2</td>
    552     <td>Dec 5, 2016</td>
    553   </tr>
    554 </table>
    555 
    556 
    557 <h3 id="id-in-openssl-&-boringssl">Information disclosure vulnerability in
    558 OpenSSL & BoringSSL</h3>
    559 
    560 <p>An information disclosure vulnerability in OpenSSL & BoringSSL could enable a
    561 remote attacker to gain access to sensitive information. This issue is rated as
    562 Moderate due to details specific to the vulnerability.</p>
    563 
    564 <table>
    565   <col width="18%">
    566   <col width="17%">
    567   <col width="10%">
    568   <col width="19%">
    569   <col width="18%">
    570   <col width="17%">
    571   <tr>
    572     <th>CVE</th>
    573     <th>References</th>
    574     <th>Severity</th>
    575     <th>Updated Google devices</th>
    576     <th>Updated AOSP versions</th>
    577     <th>Date reported</th>
    578   </tr>
    579   <tr>
    580     <td>CVE-2016-7056</td>
    581     <td><a href="https://android.googlesource.com/platform/external/boringssl/+/13179a8e75fee98740b5ce728752aa7294b3e32d">A-33752052</a></td>
    582     <td>Moderate</td>
    583     <td>All</td>
    584     <td>4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2</td>
    585     <td>Dec 19, 2016</td>
    586   </tr>
    587 </table>
    588 
    589 
    590 <h3 id="dos-in-mediaserver-2">Denial of service vulnerability in
    591 Mediaserver</h3>
    592 
    593 <p>A denial of service vulnerability in Mediaserver could enable an attacker to
    594 use a specially crafted file to cause a device hang or reboot. This issue is
    595 rated as Moderate because it requires an uncommon device configuration.</p>
    596 
    597 <table>
    598   <col width="18%">
    599   <col width="17%">
    600   <col width="10%">
    601   <col width="19%">
    602   <col width="18%">
    603   <col width="17%">
    604   <tr>
    605     <th>CVE</th>
    606     <th>References</th>
    607     <th>Severity</th>
    608     <th>Updated Google devices</th>
    609     <th>Updated AOSP versions</th>
    610     <th>Date reported</th>
    611   </tr>
    612   <tr>
    613     <td>CVE-2017-0603</td>
    614     <td><a href="https://android.googlesource.com/platform/frameworks/av/+/36b04932bb93cc3269279282686b439a17a89920">A-35763994</a></td>
    615     <td>Moderate</td>
    616     <td>All</td>
    617     <td>4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2</td>
    618     <td>Feb 23, 2017</td>
    619   </tr>
    620 </table>
    621 
    622 
    623 <h3 id="dos-in-mediaserver-3">Denial of service vulnerability in
    624 Mediaserver</h3>
    625 
    626 <p>A remote denial of service vulnerability in Mediaserver could enable an
    627 attacker to use a specially crafted file to cause a device hang or reboot. This
    628 issue is rated as Low due to details specific to the vulnerability.</p>
    629 
    630 <table>
    631   <col width="18%">
    632   <col width="17%">
    633   <col width="10%">
    634   <col width="19%">
    635   <col width="18%">
    636   <col width="17%">
    637   <tr>
    638     <th>CVE</th>
    639     <th>References</th>
    640     <th>Severity</th>
    641     <th>Updated Google devices</th>
    642     <th>Updated AOSP versions</th>
    643     <th>Date reported</th>
    644   </tr>
    645   <tr>
    646     <td>CVE-2017-0635</td>
    647     <td><a href="https://android.googlesource.com/platform/frameworks/av/+/523f6b49c1a2289161f40cf9fe80b92e592e9441">A-35467107</a></td>
    648     <td>Low</td>
    649     <td>All</td>
    650     <td>7.0, 7.1.1, 7.1.2</td>
    651     <td>Feb 16, 2017</td>
    652   </tr>
    653 </table>
    654 
    655 
    656 <h2 id="2017-05-05-details">2017-05-05 security patch level-Vulnerability
    657 details</h2>
    658 
    659 <p>In the sections below, we provide details for each of the security
    660 vulnerabilities that apply to the 2017-05-05 patch level. There is a description
    661 of the issue, a severity rationale, and a table with the CVE, associated
    662 references, severity, updated Google devices, updated AOSP versions (where
    663 applicable), and date reported. When available, we will link the public change
    664 that addressed the issue to the bug ID, like the AOSP change list. When multiple
    665 changes relate to a single bug, additional references are linked to numbers
    666 following the bug ID.</p>
    667 
    668 
    669 <h3 id="rce-in-giflib">Remote code execution vulnerability in GIFLIB</h3>
    670 
    671 <p>A remote code execution vulnerability in GIFLIB could enable an attacker using
    672 a specially crafted file to cause memory corruption during media file and data
    673 processing. This issue is rated as Critical due to the possibility of remote
    674 code execution within the context of the Mediaserver process.</p>
    675 
    676 <table>
    677   <col width="18%">
    678   <col width="17%">
    679   <col width="10%">
    680   <col width="19%">
    681   <col width="18%">
    682   <col width="17%">
    683   <tr>
    684     <th>CVE</th>
    685     <th>References</th>
    686     <th>Severity</th>
    687     <th>Updated Google devices</th>
    688     <th>Updated AOSP versions</th>
    689     <th>Date reported</th>
    690   </tr>
    691   <tr>
    692     <td>CVE-2015-7555</td>
    693     <td><a href="https://android.googlesource.com/platform/external/giflib/+/dc07290edccc2c3fc4062da835306f809cea1fdc">A-34697653</a></td>
    694     <td>Critical</td>
    695     <td>All</td>
    696     <td>4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2</td>
    697     <td>April 13, 2016</td>
    698   </tr>
    699 </table>
    700 
    701 
    702 <h3 id="eop-in-mediatek-touchscreen-driver">Elevation of privilege
    703 vulnerability in MediaTek touchscreen driver</h3>
    704 
    705 <p>An elevation of privilege vulnerability in the MediaTek touchscreen driver
    706 could enable a local malicious application to execute arbitrary code within the
    707 context of the kernel. This issue is rated as Critical due to the possibility
    708 of a local permanent device compromise, which may require reflashing the
    709 operating system to repair the device.</p>
    710 
    711 <table>
    712   <col width="19%">
    713   <col width="20%">
    714   <col width="10%">
    715   <col width="23%">
    716   <col width="17%">
    717   <tr>
    718     <th>CVE</th>
    719     <th>References</th>
    720     <th>Severity</th>
    721     <th>Updated Google devices</th>
    722     <th>Date reported</th>
    723   </tr>
    724   <tr>
    725     <td>CVE-2016-10274</td>
    726     <td>A-30202412*<br>
    727         M-ALPS02897901</td>
    728     <td>Critical</td>
    729     <td>None**</td>
    730     <td>Jul 16, 2016</td>
    731   </tr>
    732 </table>
    733 
    734 <p>* The patch for this issue is not publicly available. The update is contained
    735 in the latest binary drivers for Nexus devices available from the
    736 <a href="https://developers.google.com/android/nexus/drivers">
    737 Google Developer site</a>.</p>
    738 
    739 <p>** Supported Google devices on Android 7.1.1 or later that have installed all
    740 available updates are not affected by this vulnerability.</p>
    741 
    742 
    743 <h3 id="eop-in-qualcomm-bootloader">Elevation of privilege vulnerability in
    744 Qualcomm bootloader</h3>
    745 
    746 <p>An elevation of privilege vulnerability in the Qualcomm bootloader could enable
    747 a local malicious application to execute arbitrary code within the context of
    748 the kernel. This issue is rated as Critical due to the possibility of a local
    749 permanent device compromise, which may require reflashing the operating system
    750 to repair the device.</p>
    751 
    752 <table>
    753   <col width="19%">
    754   <col width="20%">
    755   <col width="10%">
    756   <col width="23%">
    757   <col width="17%">
    758   <tr>
    759     <th>CVE</th>
    760     <th>References</th>
    761     <th>Severity</th>
    762     <th>Updated Google devices</th>
    763     <th>Date reported</th>
    764   </tr>
    765   <tr>
    766     <td>CVE-2016-10275</td>
    767     <td>A-34514954<br>
    768         <a 
    769 href="https://source.codeaurora.org/quic/la//kernel/lk/commit/?id=1a0a15c380e11fc46f8d8706ea5ae22b752bdd0b">
    770 QC-CR#1009111</a></td>
    771     <td>Critical</td>
    772     <td>Nexus 5X, Nexus 6, Pixel, Pixel XL, Android One</td>
    773     <td>Sep 13, 2016</td>
    774   </tr>
    775   <tr>
    776     <td>CVE-2016-10276</td>
    777     <td>A-32952839<br>
    778         <a 
    779 href="https://source.codeaurora.org/quic/la//kernel/lk/commit/?id=5dac431748027e8b50a5c4079967def4ea53ad64">
    780 QC-CR#1094105</a></td>
    781     <td>Critical</td>
    782     <td>Nexus 5X, Nexus 6P, Pixel, Pixel XL</td>
    783     <td>Nov 16, 2016</td>
    784   </tr>
    785 </table>
    786 
    787 
    788 <h3 id="eop-in-kernel-sound-subsystem">Elevation of privilege vulnerability in
    789 kernel sound subsystem</h3>
    790 
    791 <p>An elevation of privilege vulnerability in the kernel sound subsystem could
    792 enable a local malicious application to execute arbitrary code within the
    793 context of the kernel. This issue is rated as Critical due to the possibility
    794 of a local permanent device compromise, which may require reflashing the
    795 operating system to repair the device.</p>
    796 
    797 <table>
    798   <col width="19%">
    799   <col width="20%">
    800   <col width="10%">
    801   <col width="23%">
    802   <col width="17%">
    803   <tr>
    804     <th>CVE</th>
    805     <th>References</th>
    806     <th>Severity</th>
    807     <th>Updated Google devices</th>
    808     <th>Date reported</th>
    809   </tr>
    810   <tr>
    811     <td>CVE-2016-9794</td>
    812     <td>A-34068036<br>
    813         <a 
    814 href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git/commit/?id=a27178e05b7c332522df40904f27674e36ee3757">
    815 Upstream kernel</a></td>
    816     <td>Critical</td>
    817     <td>Nexus 5X, Nexus 6, Nexus 6P, Nexus 9, Pixel, Pixel XL, Pixel C, Android
    818 One, Nexus Player</td>
    819     <td>Dec 3, 2016</td>
    820   </tr>
    821 </table>
    822 
    823 
    824 <h3 id="eop-in-motorola-bootloader">Elevation of privilege vulnerability in
    825 Motorola bootloader</h3>
    826 
    827 <p>An elevation of privilege vulnerability in the Motorola bootloader could enable
    828 a local malicious application to execute arbitrary code within the context of
    829 the bootloader. This issue is rated as Critical due to the possibility of a
    830 local permanent device compromise, which may require reflashing the operating
    831 system to repair the device.</p>
    832 
    833 <table>
    834   <col width="19%">
    835   <col width="20%">
    836   <col width="10%">
    837   <col width="23%">
    838   <col width="17%">
    839   <tr>
    840     <th>CVE</th>
    841     <th>References</th>
    842     <th>Severity</th>
    843     <th>Updated Google devices</th>
    844     <th>Date reported</th>
    845   </tr>
    846   <tr>
    847     <td>CVE-2016-10277</td>
    848     <td>A-33840490*<br>
    849         </td>
    850     <td>Critical</td>
    851     <td>Nexus 6</td>
    852     <td>Dec 21, 2016</td>
    853   </tr>
    854 </table>
    855 
    856 <p>* The patch for this issue is not publicly available. The update is contained
    857 in the latest binary drivers for Nexus devices available from the
    858 <a href="https://developers.google.com/android/nexus/drivers">
    859 Google Developer site</a>.</p>
    860 
    861 
    862 <h3 id="eop-in-nvidia-video-driver">Elevation of privilege vulnerability in
    863 NVIDIA video driver</h3>
    864 
    865 <p>An elevation of privilege vulnerability in the NVIDIA video driver could enable
    866 a local malicious application to execute arbitrary code within the context of
    867 the kernel. This issue is rated as Critical due to the possibility of a local
    868 permanent device compromise, which may require reflashing the operating system
    869 to repair the device.</p>
    870 
    871 <table>
    872   <col width="19%">
    873   <col width="20%">
    874   <col width="10%">
    875   <col width="23%">
    876   <col width="17%">
    877   <tr>
    878     <th>CVE</th>
    879     <th>References</th>
    880     <th>Severity</th>
    881     <th>Updated Google devices</th>
    882     <th>Date reported</th>
    883   </tr>
    884   <tr>
    885     <td>CVE-2017-0331</td>
    886     <td>A-34113000*<br>
    887         N-CVE-2017-0331</td>
    888     <td>Critical</td>
    889     <td>Nexus 9</td>
    890     <td>Jan 4, 2017</td>
    891   </tr>
    892 </table>
    893 
    894 <p>* The patch for this issue is not publicly available. The update is contained
    895 in the latest binary drivers for Nexus devices available from the
    896 <a href="https://developers.google.com/android/nexus/drivers">
    897 Google Developer site</a>.</p>
    898 
    899 
    900 <h3 id="eop-in-qualcomm-power-driver">Elevation of privilege vulnerability in
    901 Qualcomm power driver</h3>
    902 
    903 <p>An elevation of privilege vulnerability in the kernel Qualcomm power driver
    904 could enable a local malicious application to execute arbitrary code within the
    905 context of the kernel. This issue is rated as Critical due to the possibility
    906 of a local permanent device compromise, which may require reflashing the
    907 operating system to repair the device.</p>
    908 
    909 <table>
    910   <col width="19%">
    911   <col width="20%">
    912   <col width="10%">
    913   <col width="23%">
    914   <col width="17%">
    915   <tr>
    916     <th>CVE</th>
    917     <th>References</th>
    918     <th>Severity</th>
    919     <th>Updated Google devices</th>
    920     <th>Date reported</th>
    921   </tr>
    922   <tr>
    923     <td>CVE-2017-0604</td>
    924     <td>A-35392981<br>
    925         <a 
    926 href="https://source.codeaurora.org/quic/la//kernel/msm-3.18/commit/?id=6975e2dd5f37de965093ba3a8a08635a77a960f7">
    927 QC-CR#826589</a></td>
    928     <td>Critical</td>
    929     <td>None*</td>
    930     <td>Feb 15, 2017</td>
    931   </tr>
    932 </table>
    933 
    934 <p>* Supported Google devices on Android 7.1.1 or later that have installed all
    935 available updates are not affected by this vulnerability.</p>
    936 
    937 
    938 <h3 id="eop-in-kernel-trace-subsystem">Elevation of privilege vulnerability in
    939 kernel trace subsystem</h3>
    940 
    941 <p>An elevation of privilege vulnerability in the kernel trace subsystem could
    942 enable a local malicious application to execute arbitrary code within the
    943 context of the kernel. This issue is rated as Critical due to the possibility
    944 of a local permanent device compromise, which may require reflashing the
    945 operating system to repair the device.</p>
    946 
    947 <table>
    948   <col width="19%">
    949   <col width="20%">
    950   <col width="10%">
    951   <col width="23%">
    952   <col width="17%">
    953   <tr>
    954     <th>CVE</th>
    955     <th>References</th>
    956     <th>Severity</th>
    957     <th>Updated Google devices</th>
    958     <th>Date reported</th>
    959   </tr>
    960   <tr>
    961     <td>CVE-2017-0605</td>
    962     <td>A-35399704<br>
    963         <a 
    964 href="https://source.codeaurora.org/quic/la//kernel/msm-3.10/commit/?id=2161ae9a70b12cf18ac8e5952a20161ffbccb477">
    965 QC-CR#1048480</a></td>
    966     <td>Critical</td>
    967     <td>Nexus 5X, Nexus 6, Nexus 6P, Nexus 9, Pixel, Pixel XL, Pixel C, Android
    968 One, Nexus Player</td>
    969     <td>Feb 15, 2017</td>
    970   </tr>
    971 </table>
    972 
    973 
    974 <h3 id="vulnerabilities-in-qualcomm-components">Vulnerabilities in Qualcomm
    975 components</h3>
    976 
    977 <p>These vulnerabilities affect Qualcomm components and are described in further
    978 detail in the Qualcomm AMSS August, September, October, and December 2016
    979 security bulletins.</p>
    980 
    981 <table>
    982   <col width="19%">
    983   <col width="20%">
    984   <col width="10%">
    985   <col width="23%">
    986   <col width="17%">
    987   <tr>
    988     <th>CVE</th>
    989     <th>References</th>
    990     <th>Severity*</th>
    991     <th>Updated Google devices</th>
    992     <th>Date reported</th>
    993   </tr>
    994   <tr>
    995     <td>CVE-2016-10240</td>
    996     <td>A-32578446**<br>
    997         QC-CR#955710</td>
    998     <td>Critical</td>
    999     <td>Nexus 6P</td>
   1000     <td>Qualcomm internal</td>
   1001   </tr>
   1002   <tr>
   1003     <td>CVE-2016-10241</td>
   1004     <td>A-35436149**<br>
   1005         QC-CR#1068577</td>
   1006     <td>Critical</td>
   1007     <td>Nexus 5X, Nexus 6, Nexus 6P, Pixel, Pixel XL</td>
   1008     <td>Qualcomm internal</td>
   1009   </tr>
   1010   <tr>
   1011     <td>CVE-2016-10278</td>
   1012     <td>A-31624008**<br>
   1013         QC-CR#1043004</td>
   1014     <td>High</td>
   1015     <td>Pixel, Pixel XL</td>
   1016     <td>Qualcomm internal</td>
   1017   </tr>
   1018   <tr>
   1019     <td>CVE-2016-10279</td>
   1020     <td>A-31624421**<br>
   1021         QC-CR#1031821</td>
   1022     <td>High</td>
   1023     <td>Pixel, Pixel XL</td>
   1024     <td>Qualcomm internal</td>
   1025   </tr>
   1026 </table>
   1027 
   1028 <p>* The severity rating for these vulnerabilities was determined by the vendor.</p>
   1029 
   1030 <p>* The patch for this issue is not publicly available. The update is contained
   1031 in the latest binary drivers for Nexus devices available from the
   1032 <a href="https://developers.google.com/android/nexus/drivers">
   1033 Google Developer site</a>.</p>
   1034 
   1035 <h3 id="rce-in-libxml2">Remote code execution vulnerability in libxml2</h3>
   1036 
   1037 <p>A remote code execution vulnerability in libxml2 could enable an attacker to
   1038 use a specially crafted file to execute arbitrary code within the context of an
   1039 unprivileged process. This issue is rated as High due to the possibility of
   1040 remote code execution in an application that uses this library.</p>
   1041 
   1042 <table>
   1043   <col width="18%">
   1044   <col width="17%">
   1045   <col width="10%">
   1046   <col width="19%">
   1047   <col width="18%">
   1048   <col width="17%">
   1049   <tr>
   1050     <th>CVE</th>
   1051     <th>References</th>
   1052     <th>Severity</th>
   1053     <th>Updated Google devices</th>
   1054     <th>Updated AOSP versions</th>
   1055     <th>Date reported</th>
   1056   </tr>
   1057   <tr>
   1058     <td>CVE-2016-5131</td>
   1059     <td>A-32956747*</td>
   1060     <td>High</td>
   1061     <td>None**</td>
   1062     <td>4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0</td>
   1063     <td>July 23, 2016</td>
   1064   </tr>
   1065 </table>
   1066 
   1067 <p>* The patch for this issue is not publicly available. The update is contained
   1068 in the latest binary drivers for Nexus devices available from the <a
   1069 href="https://developers.google.com/android/drivers">Google Developer
   1070 site</a>.</p>
   1071 
   1072 <p>** Supported Google devices on Android 7.1.1 or later that have installed all
   1073 available updates are not affected by this vulnerability.</p>
   1074 
   1075 
   1076 <h3 id="eop-in-mediatek-thermal-driver">Elevation of privilege vulnerability in
   1077 MediaTek thermal driver</h3>
   1078 
   1079 <p>An elevation of privilege vulnerability in the MediaTek thermal driver could
   1080 enable a local malicious application to execute arbitrary code within the
   1081 context of the kernel. This issue is rated as High because it first requires
   1082 compromising a privileged process.</p>
   1083 
   1084 <table>
   1085   <col width="19%">
   1086   <col width="20%">
   1087   <col width="10%">
   1088   <col width="23%">
   1089   <col width="17%">
   1090   <tr>
   1091     <th>CVE</th>
   1092     <th>References</th>
   1093     <th>Severity</th>
   1094     <th>Updated Google devices</th>
   1095     <th>Date reported</th>
   1096   </tr>
   1097   <tr>
   1098     <td>CVE-2016-10280</td>
   1099     <td>A-28175767*<br>
   1100         M-ALPS02696445</td>
   1101     <td>High</td>
   1102     <td>None**</td>
   1103     <td>Apr 11, 2016</td>
   1104   </tr>
   1105   <tr>
   1106     <td>CVE-2016-10281</td>
   1107     <td>A-28175647*<br>
   1108         M-ALPS02696475</td>
   1109     <td>High</td>
   1110     <td>None**</td>
   1111     <td>Apr 11, 2016</td>
   1112   </tr>
   1113   <tr>
   1114     <td>CVE-2016-10282</td>
   1115     <td>A-33939045*<br>
   1116         M-ALPS03149189</td>
   1117     <td>High</td>
   1118     <td>None**</td>
   1119     <td>Dec 27, 2016</td>
   1120   </tr>
   1121 </table>
   1122 
   1123 <p>* The patch for this issue is not publicly available. The update is contained
   1124 in the latest binary drivers for Nexus devices available from the
   1125 <a href="https://developers.google.com/android/nexus/drivers">
   1126 Google Developer site</a>.</p>
   1127 
   1128 <p>** Supported Google devices on Android 7.1.1 or later that have installed all
   1129 available updates are not affected by this vulnerability.</p>
   1130 
   1131 
   1132 <h3 id="eop-in-qualcomm-wi-fi-driver">Elevation of privilege vulnerability in
   1133 Qualcomm Wi-Fi driver</h3>
   1134 
   1135 <p>An elevation of privilege vulnerability in the Qualcomm Wi-Fi driver could
   1136 enable a local malicious application to execute arbitrary code within the
   1137 context of the kernel. This issue is rated as High because it first requires
   1138 compromising a privileged process.</p>
   1139 
   1140 <table>
   1141   <col width="19%">
   1142   <col width="20%">
   1143   <col width="10%">
   1144   <col width="23%">
   1145   <col width="17%">
   1146   <tr>
   1147     <th>CVE</th>
   1148     <th>References</th>
   1149     <th>Severity</th>
   1150     <th>Updated Google devices</th>
   1151     <th>Date reported</th>
   1152   </tr>
   1153   <tr>
   1154     <td>CVE-2016-10283</td>
   1155     <td>A-32094986<br>
   1156         <a 
   1157 href="https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=93863644b4547324309613361d70ad9dc91f8dfd">
   1158 QC-CR#2002052</a></td>
   1159     <td>High</td>
   1160     <td>Nexus 5X, Pixel, Pixel XL, Android One</td>
   1161     <td>Oct 11, 2016</td>
   1162   </tr>
   1163 </table>
   1164 
   1165 
   1166 <h3 id="eop-in-qualcomm-video-driver">Elevation of privilege vulnerability in
   1167 Qualcomm video driver</h3>
   1168 
   1169 <p>An elevation of privilege vulnerability in the Qualcomm video driver could
   1170 enable a local malicious application to execute arbitrary code within the
   1171 context of the kernel. This issue is rated as High because it first requires
   1172 compromising a privileged process.</p>
   1173 
   1174 <table>
   1175   <col width="19%">
   1176   <col width="20%">
   1177   <col width="10%">
   1178   <col width="23%">
   1179   <col width="17%">
   1180   <tr>
   1181     <th>CVE</th>
   1182     <th>References</th>
   1183     <th>Severity</th>
   1184     <th>Updated Google devices</th>
   1185     <th>Date reported</th>
   1186   </tr>
   1187   <tr>
   1188     <td>CVE-2016-10284</td>
   1189     <td>A-32402303*<br>
   1190         QC-CR#2000664</td>
   1191     <td>High</td>
   1192     <td>Nexus 5X, Nexus 6, Nexus 6P, Pixel, Pixel XL, Android One</td>
   1193     <td>Oct 24, 2016</td>
   1194   </tr>
   1195   <tr>
   1196     <td>CVE-2016-10285</td>
   1197     <td>A-33752702<br>
   1198         <a 
   1199 href="https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=67dfd3a65336e0b3f55ee83d6312321dc5f2a6f9">
   1200 QC-CR#1104899</a></td>
   1201     <td>High</td>
   1202     <td>Pixel, Pixel XL</td>
   1203     <td>Dec 19, 2016</td>
   1204   </tr>
   1205   <tr>
   1206     <td>CVE-2016-10286</td>
   1207     <td>A-35400904<br>
   1208         <a 
   1209 href="https://source.codeaurora.org/quic/la//kernel/msm-4.4/commit/?id=5d30a3d0dc04916ddfb972bfc52f8e636642f999">
   1210 QC-CR#1090237</a></td>
   1211     <td>High</td>
   1212     <td>Pixel, Pixel XL</td>
   1213     <td>Feb 15, 2017</td>
   1214   </tr>
   1215 </table>
   1216 
   1217 <p>* The patch for this issue is not publicly available. The update is contained
   1218 in the latest binary drivers for Nexus devices available from the
   1219 <a href="https://developers.google.com/android/nexus/drivers">
   1220 Google Developer site</a>.</p>
   1221 
   1222 
   1223 <h3 id="eop-in-kernel-performance-subsystem">Elevation of privilege
   1224 vulnerability in kernel performance subsystem</h3>
   1225 
   1226 <p>An elevation of privilege vulnerability in the kernel performance subsystem
   1227 could enable a local malicious application to execute arbitrary code within the
   1228 context of the kernel. This issue is rated as High because it first requires
   1229 compromising a privileged process.</p>
   1230 
   1231 <table>
   1232   <col width="19%">
   1233   <col width="20%">
   1234   <col width="10%">
   1235   <col width="23%">
   1236   <col width="17%">
   1237   <tr>
   1238     <th>CVE</th>
   1239     <th>References</th>
   1240     <th>Severity</th>
   1241     <th>Updated Google devices</th>
   1242     <th>Date reported</th>
   1243   </tr>
   1244   <tr>
   1245     <td>CVE-2015-9004</td>
   1246     <td>A-34515362<br>
   1247         <a 
   1248 href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git/commit/?id=c3c87e770458aa004bd7ed3f29945ff436fd6511">
   1249 Upstream kernel</a></td>
   1250     <td>High</td>
   1251     <td>Nexus 5X, Nexus 6, Nexus 6P, Nexus 9, Pixel, Pixel XL, Pixel C, Android
   1252 One, Nexus Player</td>
   1253     <td>Nov 23, 2016</td>
   1254   </tr>
   1255 </table>
   1256 
   1257 
   1258 <h3 id="eop-in-qualcomm-sound-driver">Elevation of privilege vulnerability in
   1259 Qualcomm sound driver</h3>
   1260 
   1261 <p>An elevation of privilege vulnerability in the Qualcomm sound driver could
   1262 enable a local malicious application to execute arbitrary code within the
   1263 context of the kernel. This issue is rated as High because it first requires
   1264 compromising a privileged process.</p>
   1265 
   1266 <table>
   1267   <col width="19%">
   1268   <col width="20%">
   1269   <col width="10%">
   1270   <col width="23%">
   1271   <col width="17%">
   1272   <tr>
   1273     <th>CVE</th>
   1274     <th>References</th>
   1275     <th>Severity</th>
   1276     <th>Updated Google devices</th>
   1277     <th>Date reported</th>
   1278   </tr>
   1279   <tr>
   1280     <td>CVE-2016-10287</td>
   1281     <td>A-33784446<br>
   1282         <a 
   1283 href="https://www.codeaurora.org/gitweb/quic/la/?p=kernel/msm-4.4.git;a=commit;h=937bc9e644180e258c68662095861803f7ba4ded">
   1284 QC-CR#1112751</a></td>
   1285     <td>High</td>
   1286     <td>Nexus 5X, Nexus 6P, Pixel, Pixel XL, Android One</td>
   1287     <td>Dec 20, 2016</td>
   1288   </tr>
   1289   <tr>
   1290     <td>CVE-2017-0606</td>
   1291     <td>A-34088848<br>
   1292         <a 
   1293 href="https://www.codeaurora.org/gitweb/quic/la/?p=kernel/msm-4.4.git;a=commit;h=d3237316314c3d6f75a58192971f66e3822cd250">
   1294 QC-CR#1116015</a></td>
   1295     <td>High</td>
   1296     <td>Nexus 5X, Nexus 6P, Pixel, Pixel XL, Android One</td>
   1297     <td>Jan 3, 2017</td>
   1298   </tr>
   1299   <tr>
   1300     <td>CVE-2016-5860</td>
   1301     <td>A-34623424<br>
   1302         <a 
   1303 href="https://source.codeaurora.org/quic/la//kernel/msm-4.4/commit/?id=9f91ae0d7203714fc39ae78e1f1c4fd71ed40498">
   1304 QC-CR#1100682</a></td>
   1305     <td>High</td>
   1306     <td>Pixel, Pixel XL</td>
   1307     <td>Jan 22, 2017</td>
   1308   </tr>
   1309   <tr>
   1310     <td>CVE-2016-5867</td>
   1311     <td>A-35400602<br>
   1312         <a 
   1313 href="https://source.codeaurora.org/quic/la//kernel/msm-3.18/commit/?id=065360da7147003aed8f59782b7652d565f56be5">
   1314 QC-CR#1095947</a></td>
   1315     <td>High</td>
   1316     <td>None*</td>
   1317     <td>Feb 15, 2017</td>
   1318   </tr>
   1319   <tr>
   1320     <td>CVE-2017-0607</td>
   1321     <td>A-35400551<br>
   1322         <a 
   1323 href="https://source.codeaurora.org/quic/la//kernel/msm-4.4/commit/?id=b003c8d5407773d3aa28a48c9841e4c124da453d">
   1324 QC-CR#1085928</a></td>
   1325     <td>High</td>
   1326     <td>Pixel, Pixel XL</td>
   1327     <td>Feb 15, 2017</td>
   1328   </tr>
   1329   <tr>
   1330     <td>CVE-2017-0608</td>
   1331     <td>A-35400458<br>
   1332         <a 
   1333 href="https://source.codeaurora.org/quic/la//kernel/msm-4.4/commit/?id=b66f442dd97c781e873e8f7b248e197f86fd2980">
   1334 QC-CR#1098363</a></td>
   1335     <td>High</td>
   1336     <td>Nexus 5X, Nexus 6, Nexus 6P, Pixel, Pixel XL, Android One</td>
   1337     <td>Feb 15, 2017</td>
   1338   </tr>
   1339   <tr>
   1340     <td>CVE-2017-0609</td>
   1341     <td>A-35399801<br>
   1342         <a 
   1343 href="https://source.codeaurora.org/quic/la//kernel/msm-4.4/commit/?id=38a83df036084c00e8c5a4599c8ee7880b4ee567">
   1344 QC-CR#1090482</a></td>
   1345     <td>High</td>
   1346     <td>Nexus 5X, Nexus 6P, Pixel, Pixel XL, Android One</td>
   1347     <td>Feb 15, 2017</td>
   1348   </tr>
   1349   <tr>
   1350     <td>CVE-2016-5859</td>
   1351     <td>A-35399758<br>
   1352         <a 
   1353 href="https://source.codeaurora.org/quic/la//kernel/msm-3.18/commit/?id=97fdb441a9fb330a76245e473bc1a2155c809ebe">
   1354 QC-CR#1096672</a></td>
   1355     <td>High</td>
   1356     <td>None*</td>
   1357     <td>Feb 15, 2017</td>
   1358   </tr>
   1359   <tr>
   1360     <td>CVE-2017-0610</td>
   1361     <td>A-35399404<br>
   1362         <a 
   1363 href="https://source.codeaurora.org/quic/la//kernel/msm-4.4/commit/?id=65009746a6e649779f73d665934561ea983892fe">
   1364 QC-CR#1094852</a></td>
   1365     <td>High</td>
   1366     <td>Nexus 5X, Nexus 6, Nexus 6P, Pixel, Pixel XL, Android One</td>
   1367     <td>Feb 15, 2017</td>
   1368   </tr>
   1369   <tr>
   1370     <td>CVE-2017-0611</td>
   1371     <td>A-35393841<br>
   1372         <a 
   1373 href="https://source.codeaurora.org/quic/la//kernel/msm-4.4/commit/?id=1aa5df9246557a98181f03e98530ffd509b954c8">
   1374 QC-CR#1084210</a></td>
   1375     <td>High</td>
   1376     <td>Nexus 5X, Nexus 6, Nexus 6P, Pixel, Pixel XL, Android One</td>
   1377     <td>Feb 15, 2017</td>
   1378   </tr>
   1379   <tr>
   1380     <td>CVE-2016-5853</td>
   1381     <td>A-35392629<br>
   1382         <a 
   1383 href="https://source.codeaurora.org/quic/la//kernel/msm-4.4/commit/?id=a8f3b894de319718aecfc2ce9c691514696805be">
   1384 QC-CR#1102987</a></td>
   1385     <td>High</td>
   1386     <td>None*</td>
   1387     <td>Feb 15, 2017</td>
   1388   </tr>
   1389 </table>
   1390 
   1391 <p>* Supported Google devices on Android 7.1.1 or later that have installed all
   1392 available updates are not affected by this vulnerability.</p>
   1393 
   1394 
   1395 <h3 id="eop-in-qualcomm-led-driver">Elevation of privilege vulnerability in
   1396 Qualcomm LED driver</h3>
   1397 
   1398 <p>An elevation of privilege vulnerability in the Qualcomm LED driver could enable
   1399 a local malicious application to execute arbitrary code within the context of
   1400 the kernel. This issue is rated as High because it first requires compromising
   1401 a privileged process.</p>
   1402 
   1403 <table>
   1404   <col width="19%">
   1405   <col width="20%">
   1406   <col width="10%">
   1407   <col width="23%">
   1408   <col width="17%">
   1409   <tr>
   1410     <th>CVE</th>
   1411     <th>References</th>
   1412     <th>Severity</th>
   1413     <th>Updated Google devices</th>
   1414     <th>Date reported</th>
   1415   </tr>
   1416   <tr>
   1417     <td>CVE-2016-10288</td>
   1418     <td>A-33863909<br>
   1419         <a 
   1420 href="https://source.codeaurora.org/quic/la//kernel/msm-3.18/commit/?id=db2cdc95204bc404f03613d5dd7002251fb33660">
   1421 QC-CR#1109763</a></td>
   1422     <td>High</td>
   1423     <td>Pixel, Pixel XL</td>
   1424     <td>Dec 23, 2016</td>
   1425   </tr>
   1426 </table>
   1427 
   1428 
   1429 <h3 id="eop-in-qualcomm-crypto-driver">Elevation of privilege vulnerability in
   1430 Qualcomm crypto driver</h3>
   1431 
   1432 <p>An elevation of privilege vulnerability in the Qualcomm crypto driver could
   1433 enable a local malicious application to execute arbitrary code within the
   1434 context of the kernel. This issue is rated as High because it first requires
   1435 compromising a privileged process.</p>
   1436 
   1437 <table>
   1438   <col width="19%">
   1439   <col width="20%">
   1440   <col width="10%">
   1441   <col width="23%">
   1442   <col width="17%">
   1443   <tr>
   1444     <th>CVE</th>
   1445     <th>References</th>
   1446     <th>Severity</th>
   1447     <th>Updated Google devices</th>
   1448     <th>Date reported</th>
   1449   </tr>
   1450   <tr>
   1451     <td>CVE-2016-10289</td>
   1452     <td>A-33899710<br>
   1453         <a 
   1454 href="https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=a604e6f3889ccc343857532b63dea27603381816">
   1455 QC-CR#1116295</a></td>
   1456     <td>High</td>
   1457     <td>Nexus 5X, Nexus 6, Nexus 6P, Pixel, Pixel XL, Android One</td>
   1458     <td>Dec 24, 2016</td>
   1459   </tr>
   1460 </table>
   1461 
   1462 
   1463 <h3 id="eop-in-qualcomm-shared-memory-driver">Elevation of privilege
   1464 vulnerability in Qualcomm shared memory driver</h3>
   1465 
   1466 <p>An elevation of privilege vulnerability in the Qualcomm shared memory driver
   1467 could enable a local malicious application to execute arbitrary code within the
   1468 context of the kernel. This issue is rated as High because it first requires
   1469 compromising a privileged process.</p>
   1470 
   1471 <table>
   1472   <col width="19%">
   1473   <col width="20%">
   1474   <col width="10%">
   1475   <col width="23%">
   1476   <col width="17%">
   1477   <tr>
   1478     <th>CVE</th>
   1479     <th>References</th>
   1480     <th>Severity</th>
   1481     <th>Updated Google devices</th>
   1482     <th>Date reported</th>
   1483   </tr>
   1484   <tr>
   1485     <td>CVE-2016-10290</td>
   1486     <td>A-33898330<br>
   1487         <a 
   1488 href="https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=a5e46d8635a2e28463b365aacdeab6750abd0d49">
   1489 QC-CR#1109782</a></td>
   1490     <td>High</td>
   1491     <td>Nexus 5X, Nexus 6P, Pixel, Pixel XL</td>
   1492     <td>Dec 24, 2016</td>
   1493   </tr>
   1494 </table>
   1495 
   1496 
   1497 <h3 id="eop-in-qualcomm-slimbus-driver">Elevation of privilege vulnerability in
   1498 Qualcomm Slimbus driver</h3>
   1499 
   1500 <p>An elevation of privilege vulnerability in the Qualcomm Slimbus driver could
   1501 enable a local malicious application to execute arbitrary code within the
   1502 context of the kernel. This issue is rated as High because it first requires
   1503 compromising a privileged process.</p>
   1504 
   1505 <table>
   1506   <col width="19%">
   1507   <col width="20%">
   1508   <col width="10%">
   1509   <col width="23%">
   1510   <col width="17%">
   1511   <tr>
   1512     <th>CVE</th>
   1513     <th>References</th>
   1514     <th>Severity</th>
   1515     <th>Updated Google devices</th>
   1516     <th>Date reported</th>
   1517   </tr>
   1518   <tr>
   1519     <td>CVE-2016-10291</td>
   1520     <td>A-34030871<br>
   1521         <a 
   1522 href="https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=a225074c0494ca8125ca0ac2f9ebc8a2bd3612de">
   1523 QC-CR#986837</a></td>
   1524     <td>High</td>
   1525     <td>Nexus 5X, Nexus 6, Nexus 6P, Android One</td>
   1526     <td>Dec 31, 2016</td>
   1527   </tr>
   1528 </table>
   1529 
   1530 
   1531 <h3 id="eop-in-qualcomm-adsprpc-driver">Elevation of privilege vulnerability in
   1532 Qualcomm ADSPRPC driver</h3>
   1533 
   1534 <p>An elevation of privilege vulnerability in the Qualcomm ADSPRPC driver could
   1535 enable a local malicious application to execute arbitrary code within the
   1536 context of the kernel. This issue is rated as High because it first requires
   1537 compromising a privileged process.</p>
   1538 
   1539 <table>
   1540   <col width="19%">
   1541   <col width="20%">
   1542   <col width="10%">
   1543   <col width="23%">
   1544   <col width="17%">
   1545   <tr>
   1546     <th>CVE</th>
   1547     <th>References</th>
   1548     <th>Severity</th>
   1549     <th>Updated Google devices</th>
   1550     <th>Date reported</th>
   1551   </tr>
   1552   <tr>
   1553     <td>CVE-2017-0465</td>
   1554     <td>A-34112914<br>
   1555         <a 
   1556 href="https://source.codeaurora.org/quic/la//kernel/msm-4.4/commit/?id=3823f0f8d0bbbbd675a42a54691f4051b3c7e544">
   1557 QC-CR#1110747</a></td>
   1558     <td>High</td>
   1559     <td>Nexus 5X, Nexus 6P, Pixel, Pixel XL, Android One</td>
   1560     <td>Jan 5, 2017</td>
   1561   </tr>
   1562 </table>
   1563 
   1564 
   1565 <h3
   1566 id="eop-in-qualcomm-secure-execution-environment-communicator-driver">Elevation
   1567 of privilege vulnerability in Qualcomm Secure Execution Environment
   1568 Communicator driver</h3>
   1569 
   1570 <p>An elevation of privilege vulnerability in the Qualcomm Secure Execution
   1571 Environment Communicator driver could enable a local malicious application to
   1572 execute arbitrary code within the context of the kernel. This issue is rated as
   1573 High because it first requires compromising a privileged process.</p>
   1574 
   1575 <table>
   1576   <col width="19%">
   1577   <col width="20%">
   1578   <col width="10%">
   1579   <col width="23%">
   1580   <col width="17%">
   1581   <tr>
   1582     <th>CVE</th>
   1583     <th>References</th>
   1584     <th>Severity</th>
   1585     <th>Updated Google devices</th>
   1586     <th>Date reported</th>
   1587   </tr>
   1588   <tr>
   1589     <td>CVE-2017-0612</td>
   1590     <td>A-34389303<br>
   1591         <a 
   1592 href="https://source.codeaurora.org/quic/la//kernel/msm-3.18/commit/?id=05efafc998dc86c3b75af9803ca71255ddd7a8eb">
   1593 QC-CR#1061845</a></td>
   1594     <td>High</td>
   1595     <td>Pixel, Pixel XL</td>
   1596     <td>Jan 10, 2017</td>
   1597   </tr>
   1598   <tr>
   1599     <td>CVE-2017-0613</td>
   1600     <td>A-35400457<br>
   1601         <a 
   1602 href="https://source.codeaurora.org/quic/la//kernel/msm-4.4/commit/?id=b108c651cae9913da1ab163cb4e5f7f2db87b747">
   1603 QC-CR#1086140</a></td>
   1604     <td>High</td>
   1605     <td>Nexus 5X, Nexus 6, Nexus 6P, Pixel, Pixel XL, Android One</td>
   1606     <td>Feb 15, 2017</td>
   1607   </tr>
   1608   <tr>
   1609     <td>CVE-2017-0614</td>
   1610     <td>A-35399405<br>
   1611         <a 
   1612 href="https://source.codeaurora.org/quic/la//kernel/msm-3.18/commit/?id=fc2ae27eb9721a0ce050c2062734fec545cda604">
   1613 QC-CR#1080290</a></td>
   1614     <td>High</td>
   1615     <td>Nexus 5X, Nexus 6, Nexus 6P, Pixel, Pixel XL, Android One</td>
   1616     <td>Feb 15, 2017</td>
   1617   </tr>
   1618 </table>
   1619 
   1620 
   1621 <h3 id="eop-in-mediatek-power-driver">Elevation of privilege vulnerability in
   1622 MediaTek power driver</h3>
   1623 
   1624 <p>An elevation of privilege vulnerability in the MediaTek power driver could
   1625 enable a local malicious application to execute arbitrary code within the
   1626 context of the kernel. This issue is rated as High because it first requires
   1627 compromising a privileged process.</p>
   1628 
   1629 <table>
   1630   <col width="19%">
   1631   <col width="20%">
   1632   <col width="10%">
   1633   <col width="23%">
   1634   <col width="17%">
   1635   <tr>
   1636     <th>CVE</th>
   1637     <th>References</th>
   1638     <th>Severity</th>
   1639     <th>Updated Google devices</th>
   1640     <th>Date reported</th>
   1641   </tr>
   1642   <tr>
   1643     <td>CVE-2017-0615</td>
   1644     <td>A-34259126*<br>
   1645         M-ALPS03150278</td>
   1646     <td>High</td>
   1647     <td>None**</td>
   1648     <td>Jan 12, 2017</td>
   1649   </tr>
   1650 </table>
   1651 
   1652 <p>* The patch for this issue is not publicly available. The update is contained
   1653 in the latest binary drivers for Nexus devices available from the
   1654 <a href="https://developers.google.com/android/nexus/drivers">
   1655 Google Developer site</a>.</p>
   1656 
   1657 <p>** Supported Google devices on Android 7.1.1 or later that have installed all
   1658 available updates are not affected by this vulnerability.</p>
   1659 
   1660 
   1661 <h3 id="eop-in-mediatek-system-management-interrupt-driver">Elevation of
   1662 privilege vulnerability in MediaTek system management interrupt driver</h3>
   1663 
   1664 <p>An elevation of privilege vulnerability in the MediaTek system management
   1665 interrupt driver could enable a local malicious application to execute
   1666 arbitrary code within the context of the kernel. This issue is rated as High
   1667 because it first requires compromising a privileged process.</p>
   1668 
   1669 <table>
   1670   <col width="19%">
   1671   <col width="20%">
   1672   <col width="10%">
   1673   <col width="23%">
   1674   <col width="17%">
   1675   <tr>
   1676     <th>CVE</th>
   1677     <th>References</th>
   1678     <th>Severity</th>
   1679     <th>Updated Google devices</th>
   1680     <th>Date reported</th>
   1681   </tr>
   1682   <tr>
   1683     <td>CVE-2017-0616</td>
   1684     <td>A-34470286*<br>
   1685         M-ALPS03149160</td>
   1686     <td>High</td>
   1687     <td>None**</td>
   1688     <td>Jan 19, 2017</td>
   1689   </tr>
   1690 </table>
   1691 
   1692 <p>* The patch for this issue is not publicly available. The update is contained
   1693 in the latest binary drivers for Nexus devices available from the
   1694 <a href="https://developers.google.com/android/nexus/drivers">
   1695 Google Developer site</a>.</p>
   1696 
   1697 <p>** Supported Google devices on Android 7.1.1 or later that have installed all
   1698 available updates are not affected by this vulnerability.</p>
   1699 
   1700 
   1701 <h3 id="eop-in-mediatek-video-driver">Elevation of privilege vulnerability in
   1702 MediaTek video driver</h3>
   1703 
   1704 <p>An elevation of privilege vulnerability in the MediaTek video driver could
   1705 enable a local malicious application to execute arbitrary code within the
   1706 context of the kernel. This issue is rated as High because it first requires
   1707 compromising a privileged process.</p>
   1708 
   1709 <table>
   1710   <col width="19%">
   1711   <col width="20%">
   1712   <col width="10%">
   1713   <col width="23%">
   1714   <col width="17%">
   1715   <tr>
   1716     <th>CVE</th>
   1717     <th>References</th>
   1718     <th>Severity</th>
   1719     <th>Updated Google devices</th>
   1720     <th>Date reported</th>
   1721   </tr>
   1722   <tr>
   1723     <td>CVE-2017-0617</td>
   1724     <td>A-34471002*<br>
   1725         M-ALPS03149173</td>
   1726     <td>High</td>
   1727     <td>None**</td>
   1728     <td>Jan 19, 2017</td>
   1729   </tr>
   1730 </table>
   1731 
   1732 <p>* The patch for this issue is not publicly available. The update is contained
   1733 in the latest binary drivers for Nexus devices available from the
   1734 <a href="https://developers.google.com/android/nexus/drivers">
   1735 Google Developer site</a>.</p>
   1736 
   1737 <p>** Supported Google devices on Android 7.1.1 or later that have installed all
   1738 available updates are not affected by this vulnerability.</p>
   1739 
   1740 
   1741 <h3 id="eop-in-mediatek-command-queue-driver">Elevation of privilege
   1742 vulnerability in MediaTek command queue driver</h3>
   1743 
   1744 <p>An elevation of privilege vulnerability in the MediaTek command queue driver
   1745 could enable a local malicious application to execute arbitrary code within the
   1746 context of the kernel. This issue is rated as High because it first requires
   1747 compromising a privileged process.</p>
   1748 
   1749 <table>
   1750   <col width="19%">
   1751   <col width="20%">
   1752   <col width="10%">
   1753   <col width="23%">
   1754   <col width="17%">
   1755   <tr>
   1756     <th>CVE</th>
   1757     <th>References</th>
   1758     <th>Severity</th>
   1759     <th>Updated Google devices</th>
   1760     <th>Date reported</th>
   1761   </tr>
   1762   <tr>
   1763     <td>CVE-2017-0618</td>
   1764     <td>A-35100728*<br>
   1765         M-ALPS03161536</td>
   1766     <td>High</td>
   1767     <td>None**</td>
   1768     <td>Feb 7, 2017</td>
   1769   </tr>
   1770 </table>
   1771 
   1772 <p>* The patch for this issue is not publicly available. The update is contained
   1773 in the latest binary drivers for Nexus devices available from the
   1774 <a href="https://developers.google.com/android/nexus/drivers">
   1775 Google Developer site</a>.</p>
   1776 
   1777 <p>** Supported Google devices on Android 7.1.1 or later that have installed all
   1778 available updates are not affected by this vulnerability.</p>
   1779 
   1780 
   1781 <h3 id="eop-in-qualcomm-pin-controller-driver">Elevation of privilege
   1782 vulnerability in Qualcomm pin controller driver</h3>
   1783 
   1784 <p>An elevation of privilege vulnerability in the Qualcomm pin controller driver
   1785 could enable a local malicious application to execute arbitrary code within the
   1786 context of the kernel. This issue is rated as High because it first requires
   1787 compromising a privileged process.</p>
   1788 
   1789 <table>
   1790   <col width="19%">
   1791   <col width="20%">
   1792   <col width="10%">
   1793   <col width="23%">
   1794   <col width="17%">
   1795   <tr>
   1796     <th>CVE</th>
   1797     <th>References</th>
   1798     <th>Severity</th>
   1799     <th>Updated Google devices</th>
   1800     <th>Date reported</th>
   1801   </tr>
   1802   <tr>
   1803     <td>CVE-2017-0619</td>
   1804     <td>A-35401152<br>
   1805         <a 
   1806 href="https://source.codeaurora.org/quic/la//kernel/msm-3.14/commit/?id=72f67b29a9c5e6e8d3c34751600c749c5f5e13e1">
   1807 QC-CR#826566</a></td>
   1808     <td>High</td>
   1809     <td>Nexus 6, Android One</td>
   1810     <td>Feb 15, 2017</td>
   1811   </tr>
   1812 </table>
   1813 
   1814 
   1815 <h3 id="eop-in-qualcomm-secure-channel-manager-driver">Elevation of privilege
   1816 vulnerability in Qualcomm Secure Channel Manager Driver</h3>
   1817 
   1818 <p>An elevation of privilege vulnerability in the Qualcomm Secure Channel Manager
   1819 driver could enable a local malicious application to execute arbitrary code
   1820 within the context of the kernel. This issue is rated as High because it first
   1821 requires compromising a privileged process.</p>
   1822 
   1823 <table>
   1824   <col width="19%">
   1825   <col width="20%">
   1826   <col width="10%">
   1827   <col width="23%">
   1828   <col width="17%">
   1829   <tr>
   1830     <th>CVE</th>
   1831     <th>References</th>
   1832     <th>Severity</th>
   1833     <th>Updated Google devices</th>
   1834     <th>Date reported</th>
   1835   </tr>
   1836   <tr>
   1837     <td>CVE-2017-0620</td>
   1838     <td>A-35401052<br>
   1839         <a 
   1840 href="https://source.codeaurora.org/quic/la//kernel/msm-4.4/commit/?id=01b2c9a5d728ff6f2f1f28a5d4e927aaeabf56ed">
   1841 QC-CR#1081711</a></td>
   1842     <td>High</td>
   1843     <td>Nexus 5X, Nexus 6, Nexus 6P, Pixel, Pixel XL, Android One</td>
   1844     <td>Feb 15, 2017</td>
   1845   </tr>
   1846 </table>
   1847 
   1848 
   1849 <h3 id="eop-in-qualcomm-sound-codec-driver">Elevation of privilege
   1850 vulnerability in Qualcomm sound codec driver</h3>
   1851 
   1852 <p>An elevation of privilege vulnerability in the Qualcomm sound codec driver
   1853 could enable a local malicious application to execute arbitrary code within the
   1854 context of the kernel. This issue is rated as High because it first requires
   1855 compromising a privileged process.</p>
   1856 
   1857 <table>
   1858   <col width="19%">
   1859   <col width="20%">
   1860   <col width="10%">
   1861   <col width="23%">
   1862   <col width="17%">
   1863   <tr>
   1864     <th>CVE</th>
   1865     <th>References</th>
   1866     <th>Severity</th>
   1867     <th>Updated Google devices</th>
   1868     <th>Date reported</th>
   1869   </tr>
   1870   <tr>
   1871     <td>CVE-2016-5862</td>
   1872     <td>A-35399803<br>
   1873         <a 
   1874 href="https://source.codeaurora.org/quic/la//kernel/msm-4.4/commit/?id=4199451e83729a3add781eeafaee32994ff65b04">
   1875 QC-CR#1099607</a></td>
   1876     <td>High</td>
   1877     <td>Pixel, Pixel XL</td>
   1878     <td>Feb 15, 2017</td>
   1879   </tr>
   1880 </table>
   1881 
   1882 
   1883 <h3 id="eop-in-kernel-voltage-regulator-driver">Elevation of privilege
   1884 vulnerability in kernel voltage regulator driver</h3>
   1885 
   1886 <p>An elevation of privilege vulnerability in the kernel voltage regulator driver
   1887 could enable a local malicious application to execute arbitrary code within the
   1888 context of the kernel. This issue is rated as High because it first requires
   1889 compromising a privileged process.</p>
   1890 
   1891 <table>
   1892   <col width="19%">
   1893   <col width="20%">
   1894   <col width="10%">
   1895   <col width="23%">
   1896   <col width="17%">
   1897   <tr>
   1898     <th>CVE</th>
   1899     <th>References</th>
   1900     <th>Severity</th>
   1901     <th>Updated Google devices</th>
   1902     <th>Date reported</th>
   1903   </tr>
   1904   <tr>
   1905     <td>CVE-2014-9940</td>
   1906     <td>A-35399757<br>
   1907         <a 
   1908 href="https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git/commit/?id=60a2362f769cf549dc466134efe71c8bf9fbaaba">
   1909 Upstream kernel</a></td>
   1910     <td>High</td>
   1911     <td>Nexus 6, Nexus 9, Pixel C, Android One, Nexus Player</td>
   1912     <td>Feb 15, 2017</td>
   1913   </tr>
   1914 </table>
   1915 
   1916 
   1917 <h3 id="eop-in-qualcomm-camera-driver">Elevation of privilege vulnerability in
   1918 Qualcomm camera driver</h3>
   1919 
   1920 <p>An elevation of privilege vulnerability in the Qualcomm camera driver could
   1921 enable a local malicious application to execute arbitrary code within the
   1922 context of the kernel. This issue is rated as High because it first requires
   1923 compromising a privileged process.</p>
   1924 
   1925 <table>
   1926   <col width="19%">
   1927   <col width="20%">
   1928   <col width="10%">
   1929   <col width="23%">
   1930   <col width="17%">
   1931   <tr>
   1932     <th>CVE</th>
   1933     <th>References</th>
   1934     <th>Severity</th>
   1935     <th>Updated Google devices</th>
   1936     <th>Date reported</th>
   1937   </tr>
   1938   <tr>
   1939     <td>CVE-2017-0621</td>
   1940     <td>A-35399703<br>
   1941         <a 
   1942 href="https://source.codeaurora.org/quic/la//kernel/msm-3.10/commit/?id=9656e2c2b3523af20502bf1e933e35a397f5e82f">
   1943 QC-CR#831322</a></td>
   1944     <td>High</td>
   1945     <td>Android One</td>
   1946     <td>Feb 15, 2017</td>
   1947   </tr>
   1948 </table>
   1949 
   1950 
   1951 <h3 id="eop-in-qualcomm-networking-driver">Elevation of privilege vulnerability
   1952 in Qualcomm networking driver</h3>
   1953 
   1954 <p>An elevation of privilege vulnerability in the Qualcomm networking driver could
   1955 enable a local malicious application to execute arbitrary code within the
   1956 context of the kernel. This issue is rated as High because it first requires
   1957 compromising a privileged process.</p>
   1958 
   1959 <table>
   1960   <col width="19%">
   1961   <col width="20%">
   1962   <col width="10%">
   1963   <col width="23%">
   1964   <col width="17%">
   1965   <tr>
   1966     <th>CVE</th>
   1967     <th>References</th>
   1968     <th>Severity</th>
   1969     <th>Updated Google devices</th>
   1970     <th>Date reported</th>
   1971   </tr>
   1972   <tr>
   1973     <td>CVE-2016-5868</td>
   1974     <td>A-35392791<br>
   1975         <a 
   1976 href="https://source.codeaurora.org/quic/la//kernel/msm-4.4/commit/?id=fbb765a3f813f5cc85ddab21487fd65f24bf6a8c">
   1977 QC-CR#1104431</a></td>
   1978     <td>High</td>
   1979     <td>Nexus 5X, Pixel, Pixel XL</td>
   1980     <td>Feb 15, 2017</td>
   1981   </tr>
   1982 </table>
   1983 
   1984 
   1985 <h3 id="eop-in-kernel-networking-subsystem">Elevation of privilege
   1986 vulnerability in kernel networking subsystem</h3>
   1987 
   1988 <p>An elevation of privilege vulnerability in the kernel networking subsystem
   1989 could enable a local malicious application to execute arbitrary code within the
   1990 context of the kernel. This issue is rated as High because it first requires
   1991 compromising a privileged process.</p>
   1992 
   1993 <table>
   1994   <col width="19%">
   1995   <col width="20%">
   1996   <col width="10%">
   1997   <col width="23%">
   1998   <col width="17%">
   1999   <tr>
   2000     <th>CVE</th>
   2001     <th>References</th>
   2002     <th>Severity</th>
   2003     <th>Updated Google devices</th>
   2004     <th>Date reported</th>
   2005   </tr>
   2006   <tr>
   2007     <td>CVE-2017-7184</td>
   2008     <td>A-36565222<br>
   2009         <a 
   2010 href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=677e806da4d916052585301785d847c3b3e6186a">
   2011 Upstream kernel</a> <a 
   2012 href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f843ee6dd019bcece3e74e76ad9df0155655d0df">
   2013 [2]</a></td>
   2014     <td>High</td>
   2015     <td>Nexus 5X, Nexus 6, Nexus 6P, Nexus 9, Pixel, Pixel XL, Android One</td>
   2016     <td>Mar 23, 2017</td>
   2017   </tr>
   2018 </table>
   2019 
   2020 
   2021 <h3 id="eop-in-goodix-touchscreen-driver">Elevation of privilege vulnerability
   2022 in Goodix touchscreen driver</h3>
   2023 
   2024 <p>An elevation of privilege vulnerability in the Goodix touchscreen driver could
   2025 enable a local malicious application to execute arbitrary code within the
   2026 context of the kernel. This issue is rated as High because it first requires
   2027 compromising a privileged process.</p>
   2028 
   2029 <table>
   2030   <col width="19%">
   2031   <col width="20%">
   2032   <col width="10%">
   2033   <col width="23%">
   2034   <col width="17%">
   2035   <tr>
   2036     <th>CVE</th>
   2037     <th>References</th>
   2038     <th>Severity</th>
   2039     <th>Updated Google devices</th>
   2040     <th>Date reported</th>
   2041   </tr>
   2042   <tr>
   2043     <td>CVE-2017-0622</td>
   2044     <td>A-32749036<br>
   2045         <a 
   2046 href="https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=40efa25345003a96db34effbd23ed39530b3ac10">
   2047 QC-CR#1098602</a></td>
   2048     <td>High</td>
   2049     <td>Android One</td>
   2050     <td>Google internal</td>
   2051   </tr>
   2052 </table>
   2053 
   2054 
   2055 <h3 id="eop-in-htc-bootloader">Elevation of privilege vulnerability in HTC
   2056 bootloader</h3>
   2057 
   2058 <p>An elevation of privilege vulnerability in the HTC bootloader could enable a
   2059 local malicious application to execute arbitrary code within the context of the
   2060 bootloader. This issue is rated as High because it first requires compromising
   2061 a privileged process.</p>
   2062 
   2063 <table>
   2064   <col width="19%">
   2065   <col width="20%">
   2066   <col width="10%">
   2067   <col width="23%">
   2068   <col width="17%">
   2069   <tr>
   2070     <th>CVE</th>
   2071     <th>References</th>
   2072     <th>Severity</th>
   2073     <th>Updated Google devices</th>
   2074     <th>Date reported</th>
   2075   </tr>
   2076   <tr>
   2077     <td>CVE-2017-0623</td>
   2078     <td>A-32512358*<br>
   2079         </td>
   2080     <td>High</td>
   2081     <td>Pixel, Pixel XL</td>
   2082     <td>Google Internal</td>
   2083   </tr>
   2084 </table>
   2085 
   2086 <p>* The patch for this issue is not publicly available. The update is contained
   2087 in the latest binary drivers for Nexus devices available from the
   2088 <a href="https://developers.google.com/android/nexus/drivers">
   2089 Google Developer site</a>.</p>
   2090 
   2091 
   2092 <h3 id="id-in-qualcomm-wi-fi-driver">Information disclosure vulnerability in
   2093 Qualcomm Wi-Fi driver</h3>
   2094 
   2095 <p>An information disclosure vulnerability in the Qualcomm Wi-Fi driver could
   2096 enable a local malicious application to access data outside of its permission
   2097 levels. This issue is rated as High because it could be used to access
   2098 sensitive data without explicit user permission.</p>
   2099 
   2100 <table>
   2101   <col width="19%">
   2102   <col width="20%">
   2103   <col width="10%">
   2104   <col width="23%">
   2105   <col width="17%">
   2106   <tr>
   2107     <th>CVE</th>
   2108     <th>References</th>
   2109     <th>Severity</th>
   2110     <th>Updated Google devices</th>
   2111     <th>Date reported</th>
   2112   </tr>
   2113   <tr>
   2114     <td>CVE-2017-0624</td>
   2115     <td>A-34327795*<br>
   2116         QC-CR#2005832</td>
   2117     <td>High</td>
   2118     <td>Nexus 5X, Pixel, Pixel XL</td>
   2119     <td>Jan 16, 2017</td>
   2120   </tr>
   2121 </table>
   2122 
   2123 <p>* The patch for this issue is not publicly available. The update is contained
   2124 in the latest binary drivers for Nexus devices available from the
   2125 <a href="https://developers.google.com/android/nexus/drivers">
   2126 Google Developer site</a>.</p>
   2127 
   2128 
   2129 <h3 id="id-in-mediatek-command-queue-driver">Information disclosure
   2130 vulnerability in MediaTek command queue driver</h3>
   2131 
   2132 <p>An information disclosure vulnerability in the MediaTek command queue driver
   2133 could enable a local malicious application to access data outside of its
   2134 permission levels. This issue is rated as High because it could be used to
   2135 access sensitive data without explicit user permission.</p>
   2136 
   2137 <table>
   2138   <col width="19%">
   2139   <col width="20%">
   2140   <col width="10%">
   2141   <col width="23%">
   2142   <col width="17%">
   2143   <tr>
   2144     <th>CVE</th>
   2145     <th>References</th>
   2146     <th>Severity</th>
   2147     <th>Updated Google devices</th>
   2148     <th>Date reported</th>
   2149   </tr>
   2150   <tr>
   2151     <td>CVE-2017-0625</td>
   2152     <td>A-35142799*<br>
   2153         M-ALPS03161531</td>
   2154     <td>High</td>
   2155     <td>None**</td>
   2156     <td>Feb 8, 2017</td>
   2157   </tr>
   2158 </table>
   2159 
   2160 <p>* The patch for this issue is not publicly available. The update is contained
   2161 in the latest binary drivers for Nexus devices available from the
   2162 <a href="https://developers.google.com/android/nexus/drivers">
   2163 Google Developer site</a>.</p>
   2164 
   2165 <p>** Supported Google devices on Android 7.1.1 or later that have installed all
   2166 available updates are not affected by this vulnerability.</p>
   2167 
   2168 
   2169 <h3 id="id-in-qualcomm-crypto-engine-driver">Information disclosure
   2170 vulnerability in Qualcomm crypto engine driver</h3>
   2171 
   2172 <p>An information disclosure vulnerability in the Qualcomm crypto engine driver
   2173 could enable a local malicious application to access data outside of its
   2174 permission levels. This issue is rated as High because it could be used to
   2175 access sensitive data without explicit user permission.</p>
   2176 
   2177 <table>
   2178   <col width="19%">
   2179   <col width="20%">
   2180   <col width="10%">
   2181   <col width="23%">
   2182   <col width="17%">
   2183   <tr>
   2184     <th>CVE</th>
   2185     <th>References</th>
   2186     <th>Severity</th>
   2187     <th>Updated Google devices</th>
   2188     <th>Date reported</th>
   2189   </tr>
   2190   <tr>
   2191     <td>CVE-2017-0626</td>
   2192     <td>A-35393124<br>
   2193         <a 
   2194 href="https://source.codeaurora.org/quic/la//kernel/msm-4.4/commit/?id=64551bccab9b5b933757f6256b58f9ca0544f004">
   2195 QC-CR#1088050</a></td>
   2196     <td>High</td>
   2197     <td>Nexus 5X, Nexus 6, Nexus 6P, Pixel, Pixel XL, Android One</td>
   2198     <td>Feb 15, 2017</td>
   2199   </tr>
   2200 </table>
   2201 
   2202 
   2203 <h3 id="dos-in-qualcomm-wi-fi-driver">Denial of service vulnerability in
   2204 Qualcomm Wi-Fi driver</h3>
   2205 
   2206 <p>A denial of service vulnerability in the Qualcomm Wi-Fi driver could enable a
   2207 proximate attacker to cause a denial of service in the Wi-Fi subsystem. This
   2208 issue is rated as High due to the possibility of remote denial of service.</p>
   2209 
   2210 <table>
   2211   <col width="19%">
   2212   <col width="20%">
   2213   <col width="10%">
   2214   <col width="23%">
   2215   <col width="17%">
   2216   <tr>
   2217     <th>CVE</th>
   2218     <th>References</th>
   2219     <th>Severity</th>
   2220     <th>Updated Google devices</th>
   2221     <th>Date reported</th>
   2222   </tr>
   2223   <tr>
   2224     <td>CVE-2016-10292</td>
   2225     <td>A-34514463*<br>
   2226         QC-CR#1065466</td>
   2227     <td>High</td>
   2228     <td>Nexus 5X, Pixel, Pixel XL</td>
   2229     <td>Dec 16, 2016</td>
   2230   </tr>
   2231 </table>
   2232 
   2233 <p>* The patch for this issue is not publicly available. The update is contained
   2234 in the latest binary drivers for Nexus devices available from the
   2235 <a href="https://developers.google.com/android/nexus/drivers">
   2236 Google Developer site</a>.</p>
   2237 
   2238 
   2239 <h3 id="id-in-kernel-uvc-driver">Information disclosure vulnerability in kernel
   2240 UVC driver</h3>
   2241 
   2242 <p>An information disclosure vulnerability in the kernel UVC driver could enable a
   2243 local malicious application to access data outside of its permission levels.
   2244 This issue is rated as Moderate because it first requires compromising a
   2245 privileged process.</p>
   2246 
   2247 <table>
   2248   <col width="19%">
   2249   <col width="20%">
   2250   <col width="10%">
   2251   <col width="23%">
   2252   <col width="17%">
   2253   <tr>
   2254     <th>CVE</th>
   2255     <th>References</th>
   2256     <th>Severity</th>
   2257     <th>Updated Google devices</th>
   2258     <th>Date reported</th>
   2259   </tr>
   2260   <tr>
   2261     <td>CVE-2017-0627</td>
   2262     <td>A-33300353*<br>
   2263         </td>
   2264     <td>Moderate</td>
   2265     <td>Nexus 5X, Nexus 6P, Nexus 9, Pixel C, Nexus Player</td>
   2266     <td>Dec 2, 2016</td>
   2267   </tr>
   2268 </table>
   2269 
   2270 <p>* The patch for this issue is not publicly available. The update is contained
   2271 in the latest binary drivers for Nexus devices available from the
   2272 <a href="https://developers.google.com/android/nexus/drivers">
   2273 Google Developer site</a>.</p>
   2274 
   2275 
   2276 <h3 id="id-in-qualcomm-video-driver">Information disclosure vulnerability in
   2277 Qualcomm video driver</h3>
   2278 
   2279 <p>An information disclosure vulnerability in the Qualcomm video driver could
   2280 enable a local malicious application to access data outside of its permission
   2281 levels. This issue is rated as Moderate because it first requires compromising
   2282 a privileged process.</p>
   2283 
   2284 <table>
   2285   <col width="19%">
   2286   <col width="20%">
   2287   <col width="10%">
   2288   <col width="23%">
   2289   <col width="17%">
   2290   <tr>
   2291     <th>CVE</th>
   2292     <th>References</th>
   2293     <th>Severity</th>
   2294     <th>Updated Google devices</th>
   2295     <th>Date reported</th>
   2296   </tr>
   2297   <tr>
   2298     <td>CVE-2016-10293</td>
   2299     <td>A-33352393<br>
   2300         <a 
   2301 href="https://source.codeaurora.org/quic/la/kernel/msm-3.10/commit/?id=2469d5374745a2228f774adbca6fb95a79b9047f">
   2302 QC-CR#1101943</a></td>
   2303     <td>Moderate</td>
   2304     <td>Nexus 5X, Nexus 6P, Android One</td>
   2305     <td>Dec 4, 2016</td>
   2306   </tr>
   2307 </table>
   2308 
   2309 
   2310 <h3 id="id-in-qualcomm-power-driver-(device-specific)">Information disclosure
   2311 vulnerability in Qualcomm power driver (device specific)</h3>
   2312 
   2313 <p>An information disclosure vulnerability in the Qualcomm power driver could
   2314 enable a local malicious application to access data outside of its permission
   2315 levels. This issue is rated as Moderate because it first requires compromising
   2316 a privileged process.</p>
   2317 
   2318 <table>
   2319   <col width="19%">
   2320   <col width="20%">
   2321   <col width="10%">
   2322   <col width="23%">
   2323   <col width="17%">
   2324   <tr>
   2325     <th>CVE</th>
   2326     <th>References</th>
   2327     <th>Severity</th>
   2328     <th>Updated Google devices</th>
   2329     <th>Date reported</th>
   2330   </tr>
   2331   <tr>
   2332     <td>CVE-2016-10294</td>
   2333     <td>A-33621829<br>
   2334         <a 
   2335 href="https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=9e9bc51ffb8a298f0be5befe346762cdb6e1d49c">
   2336 QC-CR#1105481</a></td>
   2337     <td>Moderate</td>
   2338     <td>Nexus 5X, Nexus 6P, Pixel, Pixel XL</td>
   2339     <td>Dec 14, 2016</td>
   2340   </tr>
   2341 </table>
   2342 
   2343 
   2344 <h3 id="id-in-qualcomm-led-driver">Information disclosure vulnerability in
   2345 Qualcomm LED driver</h3>
   2346 
   2347 <p>An information disclosure vulnerability in the Qualcomm LED driver could enable
   2348 a local malicious application to access data outside of its permission levels.
   2349 This issue is rated as Moderate because it first requires compromising a
   2350 privileged process.</p>
   2351 
   2352 <table>
   2353   <col width="19%">
   2354   <col width="20%">
   2355   <col width="10%">
   2356   <col width="23%">
   2357   <col width="17%">
   2358   <tr>
   2359     <th>CVE</th>
   2360     <th>References</th>
   2361     <th>Severity</th>
   2362     <th>Updated Google devices</th>
   2363     <th>Date reported</th>
   2364   </tr>
   2365   <tr>
   2366     <td>CVE-2016-10295</td>
   2367     <td>A-33781694<br>
   2368         <a 
   2369 href="https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=f11ae3df500bc2a093ddffee6ea40da859de0fa9">
   2370 QC-CR#1109326</a></td>
   2371     <td>Moderate</td>
   2372     <td>Pixel, Pixel XL</td>
   2373     <td>Dec 20, 2016</td>
   2374   </tr>
   2375 </table>
   2376 
   2377 
   2378 <h3 id="id-in-qualcomm-shared-memory-driver">Information disclosure
   2379 vulnerability in Qualcomm shared memory driver</h3>
   2380 
   2381 <p>An information disclosure vulnerability in the Qualcomm shared memory driver
   2382 could enable a local malicious application to access data outside of its
   2383 permission levels. This issue is rated as Moderate because it first requires
   2384 compromising a privileged process.</p>
   2385 
   2386 <table>
   2387   <col width="19%">
   2388   <col width="20%">
   2389   <col width="10%">
   2390   <col width="23%">
   2391   <col width="17%">
   2392   <tr>
   2393     <th>CVE</th>
   2394     <th>References</th>
   2395     <th>Severity</th>
   2396     <th>Updated Google devices</th>
   2397     <th>Date reported</th>
   2398   </tr>
   2399   <tr>
   2400     <td>CVE-2016-10296</td>
   2401     <td>A-33845464<br>
   2402         <a 
   2403 href="https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=a5e46d8635a2e28463b365aacdeab6750abd0d49">
   2404 QC-CR#1109782</a></td>
   2405     <td>Moderate</td>
   2406     <td>Nexus 5X, Nexus 6P, Pixel, Pixel XL, Android One</td>
   2407     <td>Dec 22, 2016</td>
   2408   </tr>
   2409 </table>
   2410 
   2411 
   2412 <h3 id="id-in-qualcomm-camera-driver">Information disclosure vulnerability in
   2413 Qualcomm camera driver</h3>
   2414 
   2415 <p>An information disclosure vulnerability in the Qualcomm camera driver could
   2416 enable a local malicious application to access data outside of its permission
   2417 levels. This issue is rated as Moderate because it first requires compromising
   2418 a privileged process.</p>
   2419 
   2420 <table>
   2421   <col width="19%">
   2422   <col width="20%">
   2423   <col width="10%">
   2424   <col width="23%">
   2425   <col width="17%">
   2426   <tr>
   2427     <th>CVE</th>
   2428     <th>References</th>
   2429     <th>Severity</th>
   2430     <th>Updated Google devices</th>
   2431     <th>Date reported</th>
   2432   </tr>
   2433   <tr>
   2434     <td>CVE-2017-0628</td>
   2435     <td>A-34230377<br>
   2436         <a 
   2437 href="https://source.codeaurora.org/quic/la//kernel/msm-4.4/commit/?id=012e37bf91490c5b59ba2ab68a4d214b632b613f">
   2438 QC-CR#1086833</a></td>
   2439     <td>Moderate</td>
   2440     <td>Nexus 5X, Nexus 6, Pixel, Pixel XL</td>
   2441     <td>Jan 10, 2017</td>
   2442   </tr>
   2443   <tr>
   2444     <td>CVE-2017-0629</td>
   2445     <td>A-35214296<br>
   2446         <a 
   2447 href="https://source.codeaurora.org/quic/la//kernel/msm-4.4/commit/?id=012e37bf91490c5b59ba2ab68a4d214b632b613f">
   2448 QC-CR#1086833</a></td>
   2449     <td>Moderate</td>
   2450     <td>Nexus 5X, Nexus 6, Pixel, Pixel XL</td>
   2451     <td>Feb 8, 2017</td>
   2452   </tr>
   2453 </table>
   2454 
   2455 
   2456 <h3 id="id-in-kernel-trace-subsystem">Information disclosure vulnerability in
   2457 kernel trace subsystem</h3>
   2458 
   2459 <p>An information disclosure vulnerability in the kernel trace subsystem could
   2460 enable a local malicious application to access data outside of its permission
   2461 levels. This issue is rated as Moderate because it first requires compromising
   2462 a privileged process.</p>
   2463 
   2464 <table>
   2465   <col width="19%">
   2466   <col width="20%">
   2467   <col width="10%">
   2468   <col width="23%">
   2469   <col width="17%">
   2470   <tr>
   2471     <th>CVE</th>
   2472     <th>References</th>
   2473     <th>Severity</th>
   2474     <th>Updated Google devices</th>
   2475     <th>Date reported</th>
   2476   </tr>
   2477   <tr>
   2478     <td>CVE-2017-0630</td>
   2479     <td>A-34277115*<br>
   2480         </td>
   2481     <td>Moderate</td>
   2482     <td>Nexus 5X, Nexus 6, Nexus 6P, Nexus 9, Pixel, Pixel XL, Pixel C, Android
   2483 One, Nexus Player</td>
   2484     <td>Jan 11, 2017</td>
   2485   </tr>
   2486 </table>
   2487 
   2488 <p>* The patch for this issue is not publicly available. The update is contained
   2489 in the latest binary drivers for Nexus devices available from the
   2490 <a href="https://developers.google.com/android/nexus/drivers">
   2491 Google Developer site</a>.</p>
   2492 
   2493 
   2494 <h3 id="id-in-qualcomm-sound-codec-driver">Information disclosure vulnerability
   2495 in Qualcomm sound codec driver</h3>
   2496 
   2497 <p>An information disclosure vulnerability in the Qualcomm sound codec driver
   2498 could enable a local malicious application to access data outside of its
   2499 permission levels. This issue is rated as Moderate because it first requires
   2500 compromising a privileged process.</p>
   2501 
   2502 <table>
   2503   <col width="19%">
   2504   <col width="20%">
   2505   <col width="10%">
   2506   <col width="23%">
   2507   <col width="17%">
   2508   <tr>
   2509     <th>CVE</th>
   2510     <th>References</th>
   2511     <th>Severity</th>
   2512     <th>Updated Google devices</th>
   2513     <th>Date reported</th>
   2514   </tr>
   2515   <tr>
   2516     <td>CVE-2016-5858</td>
   2517     <td>A-35400153<br>
   2518         <a 
   2519 href="https://source.codeaurora.org/quic/la//kernel/msm-3.18/commit/?id=3154eb1d263b9c3eab2c9fa8ebe498390bf5d711">
   2520 QC-CR#1096799</a> <a 
   2521 href="https://source.codeaurora.org/quic/la//kernel/msm-3.18/commit/?id=afc5bea71bc8f251dad1104568383019f4923af6">
   2522 [2]</a></td>
   2523     <td>Moderate</td>
   2524     <td>Nexus 5X, Nexus 6, Nexus 6P, Pixel, Pixel XL, Android One</td>
   2525     <td>Feb 15, 2017</td>
   2526   </tr>
   2527 </table>
   2528 
   2529 
   2530 <h3 id="id-in-qualcomm-camera-driver-2">Information disclosure vulnerability in
   2531 Qualcomm camera driver</h3>
   2532 
   2533 <p>An information disclosure vulnerability in the Qualcomm camera driver could
   2534 enable a local malicious application to access data outside of its permission
   2535 levels. This issue is rated as Moderate because it first requires compromising
   2536 a privileged process.</p>
   2537 
   2538 <table>
   2539   <col width="19%">
   2540   <col width="20%">
   2541   <col width="10%">
   2542   <col width="23%">
   2543   <col width="17%">
   2544   <tr>
   2545     <th>CVE</th>
   2546     <th>References</th>
   2547     <th>Severity</th>
   2548     <th>Updated Google devices</th>
   2549     <th>Date reported</th>
   2550   </tr>
   2551   <tr>
   2552     <td>CVE-2017-0631</td>
   2553     <td>A-35399756<br>
   2554         <a 
   2555 href="https://source.codeaurora.org/quic/la//kernel/msm-4.4/commit/?id=8236d6ebc7e26361ca7078cbeba01509f10941d8">
   2556 QC-CR#1093232</a></td>
   2557     <td>Moderate</td>
   2558     <td>Nexus 5X, Nexus 6P, Pixel, Pixel XL, Android One</td>
   2559     <td>Feb 15, 2017</td>
   2560   </tr>
   2561 </table>
   2562 
   2563 
   2564 <h3 id="id-in-qualcomm-sound-driver">Information disclosure vulnerability in
   2565 Qualcomm sound driver</h3>
   2566 
   2567 <p>An information disclosure vulnerability in the Qualcomm sound driver could
   2568 enable a local malicious application to access data outside of its permission
   2569 levels. This issue is rated as Moderate because it first requires compromising
   2570 a privileged process.</p>
   2571 
   2572 <table>
   2573   <col width="19%">
   2574   <col width="20%">
   2575   <col width="10%">
   2576   <col width="23%">
   2577   <col width="17%">
   2578   <tr>
   2579     <th>CVE</th>
   2580     <th>References</th>
   2581     <th>Severity</th>
   2582     <th>Updated Google devices</th>
   2583     <th>Date reported</th>
   2584   </tr>
   2585   <tr>
   2586     <td>CVE-2016-5347</td>
   2587     <td>A-35394329<br>
   2588         <a 
   2589 href="https://source.codeaurora.org/quic/la//kernel/msm-4.4/commit/?id=f14390f13e62460fc6b05fc0acde0e825374fdb6">
   2590 QC-CR#1100878</a></td>
   2591     <td>Moderate</td>
   2592     <td>Nexus 5X, Nexus 6, Nexus 6P, Pixel, Pixel XL, Android One</td>
   2593     <td>Feb 15, 2017</td>
   2594   </tr>
   2595 </table>
   2596 
   2597 
   2598 <h3 id="id-in-qualcomm-spcom-driver">Information disclosure vulnerability in
   2599 Qualcomm SPCom driver</h3>
   2600 
   2601 <p>An information disclosure vulnerability in the Qualcomm SPCom driver could
   2602 enable a local malicious application to access data outside of its permission
   2603 levels. This issue is rated as Moderate because it first requires compromising
   2604 a privileged process.</p>
   2605 
   2606 <table>
   2607   <col width="19%">
   2608   <col width="20%">
   2609   <col width="10%">
   2610   <col width="23%">
   2611   <col width="17%">
   2612   <tr>
   2613     <th>CVE</th>
   2614     <th>References</th>
   2615     <th>Severity</th>
   2616     <th>Updated Google devices</th>
   2617     <th>Date reported</th>
   2618   </tr>
   2619   <tr>
   2620     <td>CVE-2016-5854</td>
   2621     <td>A-35392792<br>
   2622         <a 
   2623 href="https://source.codeaurora.org/quic/la//kernel/msm-4.4/commit/?id=28d23d4d7999f683b27b6e0c489635265b67a4c9">
   2624 QC-CR#1092683</a></td>
   2625     <td>Moderate</td>
   2626     <td>None*</td>
   2627     <td>Feb 15, 2017</td>
   2628   </tr>
   2629   <tr>
   2630     <td>CVE-2016-5855</td>
   2631     <td>A-35393081<br>
   2632         <a 
   2633 href="https://source.codeaurora.org/quic/la//kernel/msm-4.4/commit/?id=a5edb54e93ba85719091fe2bc426d75fa7059834">
   2634 QC-CR#1094143</a></td>
   2635     <td>Moderate</td>
   2636     <td>None*</td>
   2637     <td>Feb 15, 2017</td>
   2638   </tr>
   2639 </table>
   2640 
   2641 <p>* Supported Google devices on Android 7.1.1 or later that have installed all
   2642 available updates are not affected by this vulnerability.</p>
   2643 
   2644 
   2645 <h3 id="id-in-qualcomm-sound-codec-driver-2">Information disclosure
   2646 vulnerability in Qualcomm sound codec driver</h3>
   2647 
   2648 <p>An information disclosure vulnerability in the Qualcomm sound codec driver
   2649 could enable a local malicious application to access data outside of its
   2650 permission levels. This issue is rated as Moderate because it first requires
   2651 compromising a privileged process.</p>
   2652 
   2653 <table>
   2654   <col width="19%">
   2655   <col width="20%">
   2656   <col width="10%">
   2657   <col width="23%">
   2658   <col width="17%">
   2659   <tr>
   2660     <th>CVE</th>
   2661     <th>References</th>
   2662     <th>Severity</th>
   2663     <th>Updated Google devices</th>
   2664     <th>Date reported</th>
   2665   </tr>
   2666   <tr>
   2667     <td>CVE-2017-0632</td>
   2668     <td>A-35392586<br>
   2669         <a 
   2670 href="https://source.codeaurora.org/quic/la//kernel/msm-3.10/commit/?id=970d6933e53c1f7ca8c8b67f49147b18505c3b8f">
   2671 QC-CR#832915</a></td>
   2672     <td>Moderate</td>
   2673     <td>Android One</td>
   2674     <td>Feb 15, 2017</td>
   2675   </tr>
   2676 </table>
   2677 
   2678 
   2679 <h3 id="id-in-broadcom-wi-fi-driver">Information disclosure vulnerability in
   2680 Broadcom Wi-Fi driver</h3>
   2681 
   2682 <p>An information disclosure vulnerability in the Broadcom Wi-Fi driver could
   2683 enable a local malicious component to access data outside of its permission
   2684 levels. This issue is rated as Moderate because it first requires compromising
   2685 a privileged process.</p>
   2686 
   2687 <table>
   2688   <col width="19%">
   2689   <col width="20%">
   2690   <col width="10%">
   2691   <col width="23%">
   2692   <col width="17%">
   2693   <tr>
   2694     <th>CVE</th>
   2695     <th>References</th>
   2696     <th>Severity</th>
   2697     <th>Updated Google devices</th>
   2698     <th>Date reported</th>
   2699   </tr>
   2700   <tr>
   2701     <td>CVE-2017-0633</td>
   2702     <td>A-36000515*<br>
   2703         B-RB#117131</td>
   2704     <td>Moderate</td>
   2705     <td>Nexus 6, Nexus 6P, Nexus 9, Pixel C, Nexus Player</td>
   2706     <td>Feb 23, 2017</td>
   2707   </tr>
   2708 </table>
   2709 
   2710 <p>* The patch for this issue is not publicly available. The update is contained
   2711 in the latest binary drivers for Nexus devices available from the
   2712 <a href="https://developers.google.com/android/nexus/drivers">
   2713 Google Developer site</a>.</p>
   2714 
   2715 
   2716 <h3 id="id-in-synaptics-touchscreen-driver">Information disclosure
   2717 vulnerability in Synaptics touchscreen driver</h3>
   2718 
   2719 <p>An information disclosure vulnerability in the Synaptics touchscreen driver
   2720 could enable a local malicious application to access data outside of its
   2721 permission levels. This issue is rated as Moderate because it first requires
   2722 compromising a privileged process.</p>
   2723 
   2724 <table>
   2725   <col width="19%">
   2726   <col width="20%">
   2727   <col width="10%">
   2728   <col width="23%">
   2729   <col width="17%">
   2730   <tr>
   2731     <th>CVE</th>
   2732     <th>References</th>
   2733     <th>Severity</th>
   2734     <th>Updated Google devices</th>
   2735     <th>Date reported</th>
   2736   </tr>
   2737   <tr>
   2738     <td>CVE-2017-0634</td>
   2739     <td>A-32511682*<br>
   2740         </td>
   2741     <td>Moderate</td>
   2742     <td>Pixel, Pixel XL</td>
   2743     <td>Google internal</td>
   2744   </tr>
   2745 </table>
   2746 
   2747 <p>* The patch for this issue is not publicly available. The update is contained
   2748 in the latest binary drivers for Nexus devices available from the
   2749 <a href="https://developers.google.com/android/nexus/drivers">
   2750 Google Developer site</a>.</p>
   2751 
   2752 
   2753 <h3 id="vulnerabilities-in-qualcomm-components-2">Vulnerabilities in Qualcomm
   2754 components</h3>
   2755 
   2756 <p>These vulnerabilities affecting Qualcomm components were released as part of
   2757 Qualcomm AMSS security bulletins between 20142016. They are included in this
   2758 Android security bulletin to associate their fixes with an Android security
   2759 patch level.</p>
   2760 
   2761 <table>
   2762   <col width="19%">
   2763   <col width="20%">
   2764   <col width="10%">
   2765   <col width="23%">
   2766   <col width="17%">
   2767   <tr>
   2768     <th>CVE</th>
   2769     <th>References</th>
   2770     <th>Severity*</th>
   2771     <th>Updated Google devices</th>
   2772     <th>Date reported</th>
   2773   </tr>
   2774   <tr>
   2775     <td>CVE-2014-9923</td>
   2776     <td>A-35434045**<br>
   2777         QC-CR#403910</td>
   2778     <td>Critical</td>
   2779     <td>None***</td>
   2780     <td>Qualcomm internal</td>
   2781   </tr>
   2782   <tr>
   2783     <td>CVE-2014-9924</td>
   2784     <td>A-35434631**<br>
   2785         QC-CR#596102</td>
   2786     <td>Critical</td>
   2787     <td>None***</td>
   2788     <td>Qualcomm internal</td>
   2789   </tr>
   2790   <tr>
   2791     <td>CVE-2014-9925</td>
   2792     <td>A-35444657**<br>
   2793         QC-CR#638130</td>
   2794     <td>Critical</td>
   2795     <td>None***</td>
   2796     <td>Qualcomm internal</td>
   2797   </tr>
   2798   <tr>
   2799     <td>CVE-2014-9926</td>
   2800     <td>A-35433784**<br>
   2801         QC-CR#631527</td>
   2802     <td>Critical</td>
   2803     <td>None***</td>
   2804     <td>Qualcomm internal</td>
   2805   </tr>
   2806   <tr>
   2807     <td>CVE-2014-9927</td>
   2808     <td>A-35433785**<br>
   2809         QC-CR#661111</td>
   2810     <td>Critical</td>
   2811     <td>None***</td>
   2812     <td>Qualcomm internal</td>
   2813   </tr>
   2814   <tr>
   2815     <td>CVE-2014-9928</td>
   2816     <td>A-35438623**<br>
   2817         QC-CR#696972</td>
   2818     <td>Critical</td>
   2819     <td>None***</td>
   2820     <td>Qualcomm internal</td>
   2821   </tr>
   2822   <tr>
   2823     <td>CVE-2014-9929</td>
   2824     <td>A-35443954**<br>
   2825         QC-CR#644783</td>
   2826     <td>Critical</td>
   2827     <td>None***</td>
   2828     <td>Qualcomm internal</td>
   2829   </tr>
   2830   <tr>
   2831     <td>CVE-2014-9930</td>
   2832     <td>A-35432946**<br>
   2833         QC-CR#634637</td>
   2834     <td>Critical</td>
   2835     <td>None***</td>
   2836     <td>Qualcomm internal</td>
   2837   </tr>
   2838   <tr>
   2839     <td>CVE-2015-9005</td>
   2840     <td>A-36393500**<br>
   2841         QC-CR#741548</td>
   2842     <td>Critical</td>
   2843     <td>None***</td>
   2844     <td>Qualcomm internal</td>
   2845   </tr>
   2846   <tr>
   2847     <td>CVE-2015-9006</td>
   2848     <td>A-36393450**<br>
   2849         QC-CR#750559</td>
   2850     <td>Critical</td>
   2851     <td>None***</td>
   2852     <td>Qualcomm internal</td>
   2853   </tr>
   2854   <tr>
   2855     <td>CVE-2015-9007</td>
   2856     <td>A-36393700**<br>
   2857         QC-CR#807173</td>
   2858     <td>Critical</td>
   2859     <td>None***</td>
   2860     <td>Qualcomm internal</td>
   2861   </tr>
   2862   <tr>
   2863     <td>CVE-2016-10297</td>
   2864     <td>A-36393451**<br>
   2865         QC-CR#1061123</td>
   2866     <td>Critical</td>
   2867     <td>None***</td>
   2868     <td>Qualcomm internal</td>
   2869   </tr>
   2870   <tr>
   2871     <td>CVE-2014-9941</td>
   2872     <td>A-36385125**<br>
   2873         QC-CR#509915</td>
   2874     <td>High</td>
   2875     <td>None***</td>
   2876     <td>Qualcomm internal</td>
   2877   </tr>
   2878   <tr>
   2879     <td>CVE-2014-9942</td>
   2880     <td>A-36385319**<br>
   2881         QC-CR#533283</td>
   2882     <td>High</td>
   2883     <td>None***</td>
   2884     <td>Qualcomm internal</td>
   2885   </tr>
   2886   <tr>
   2887     <td>CVE-2014-9943</td>
   2888     <td>A-36385219**<br>
   2889         QC-CR#546527</td>
   2890     <td>High</td>
   2891     <td>None***</td>
   2892     <td>Qualcomm internal</td>
   2893   </tr>
   2894   <tr>
   2895     <td>CVE-2014-9944</td>
   2896     <td>A-36384534**<br>
   2897         QC-CR#613175</td>
   2898     <td>High</td>
   2899     <td>None***</td>
   2900     <td>Qualcomm internal</td>
   2901   </tr>
   2902   <tr>
   2903     <td>CVE-2014-9945</td>
   2904     <td>A-36386912**<br>
   2905         QC-CR#623452</td>
   2906     <td>High</td>
   2907     <td>None***</td>
   2908     <td>Qualcomm internal</td>
   2909   </tr>
   2910   <tr>
   2911     <td>CVE-2014-9946</td>
   2912     <td>A-36385281**<br>
   2913         QC-CR#520149</td>
   2914     <td>High</td>
   2915     <td>None***</td>
   2916     <td>Qualcomm internal</td>
   2917   </tr>
   2918   <tr>
   2919     <td>CVE-2014-9947</td>
   2920     <td>A-36392400**<br>
   2921         QC-CR#650540</td>
   2922     <td>High</td>
   2923     <td>None***</td>
   2924     <td>Qualcomm internal</td>
   2925   </tr>
   2926   <tr>
   2927     <td>CVE-2014-9948</td>
   2928     <td>A-36385126**<br>
   2929         QC-CR#650500</td>
   2930     <td>High</td>
   2931     <td>None***</td>
   2932     <td>Qualcomm internal</td>
   2933   </tr>
   2934   <tr>
   2935     <td>CVE-2014-9949</td>
   2936     <td>A-36390608**<br>
   2937         QC-CR#652426</td>
   2938     <td>High</td>
   2939     <td>None***</td>
   2940     <td>Qualcomm internal</td>
   2941   </tr>
   2942   <tr>
   2943     <td>CVE-2014-9950</td>
   2944     <td>A-36385321**<br>
   2945         QC-CR#655530</td>
   2946     <td>High</td>
   2947     <td>None***</td>
   2948     <td>Qualcomm internal</td>
   2949   </tr>
   2950   <tr>
   2951     <td>CVE-2014-9951</td>
   2952     <td>A-36389161**<br>
   2953         QC-CR#525043</td>
   2954     <td>High</td>
   2955     <td>None***</td>
   2956     <td>Qualcomm internal</td>
   2957   </tr>
   2958   <tr>
   2959     <td>CVE-2014-9952</td>
   2960     <td>A-36387019**<br>
   2961         QC-CR#674836</td>
   2962     <td>High</td>
   2963     <td>None***</td>
   2964     <td>Qualcomm internal</td>
   2965   </tr>
   2966 </table>
   2967 
   2968 <p>* The severity rating for these vulnerabilities was determined by the vendor.</p>
   2969 
   2970 <p>* The patch for this issue is not publicly available. The update is contained
   2971 in the latest binary drivers for Nexus devices available from the
   2972 <a href="https://developers.google.com/android/nexus/drivers">
   2973 Google Developer site</a>.</p>
   2974 
   2975 <p>*** Supported Google devices on Android 7.1.1 or later that have installed all
   2976 available updates are not affected by this vulnerability.</p>
   2977 
   2978 <h2 id="common-questions-and-answers">Common Questions and Answers</h2>
   2979 <p>This section answers common questions that may occur after reading this
   2980 bulletin.</p>
   2981 
   2982 <p><strong>1. How do I determine if my device is updated to address these issues?
   2983 </strong></p>
   2984 
   2985 <p>To learn how to check a device's security patch level, read the instructions on
   2986 the
   2987 <a href="https://support.google.com/pixelphone/answer/4457705#pixel_phones&nexus_devices">Pixel
   2988 and Nexus update schedule</a>.</p>
   2989 
   2990 <ul>
   2991 <li>Security patch levels of 2017-05-01 or later address all issues associated
   2992 with the 2017-05-01 security patch level.</li>
   2993 <li>Security patch levels of 2017-05-05 or later address all issues associated
   2994 with the 2017-05-05 security patch level and all previous patch levels.
   2995 </li>
   2996 </ul>
   2997 
   2998 <p>Device manufacturers that include these updates should set the patch string
   2999 level to:</p>
   3000 <ul>
   3001 <li>[ro.build.version.security_patch]:[2017-05-01]</li>
   3002 <li>[ro.build.version.security_patch]:[2017-05-05]</li>
   3003 </ul>
   3004 
   3005 <p><strong>2. Why does this bulletin have two security patch levels?</strong></p>
   3006 
   3007 <p>This bulletin has two security patch levels so that Android partners have the
   3008 flexibility to fix a subset of vulnerabilities that are similar across all
   3009 Android devices more quickly. Android partners are encouraged to fix all issues
   3010 in this bulletin and use the latest security patch level.</p>
   3011 <ul>
   3012 <li>Devices that use the May 01, 2017 security patch level must include all
   3013 issues associated with that security patch level, as well as fixes for all
   3014 issues reported in previous security bulletins.</li>
   3015 <li>Devices that use the security patch level of May 05, 2017 or newer must
   3016 include all applicable patches in this (and previous) security
   3017 bulletins.</li>
   3018 </ul>
   3019 
   3020 <p>Partners are encouraged to bundle the fixes for all issues they are addressing
   3021 in a single update.</p>
   3022 
   3023 <p><strong>3. How do I determine which Google devices are affected by each
   3024 issue?</strong></p>
   3025 
   3026 <p>In the <a
   3027 href="#2017-05-01-details">2017-05-01</a> and
   3028 <a href="#2017-05-05-details">2017-05-05</a>
   3029 security vulnerability details sections, each table has an <em>Updated Google
   3030 devices</em> column that covers the range of affected Google devices updated for
   3031 each issue. This column has a few options:</p>
   3032 <ul>
   3033 <li><strong>All Google devices</strong>: If an issue affects All and Pixel
   3034 devices, the table will have "All" in the <em>Updated Google devices</em>
   3035 column. "All" encapsulates the following <a
   3036 href="https://support.google.com/pixelphone/answer/4457705#pixel_phones&nexus_devices">supported
   3037 devices</a>: Nexus 5X, Nexus 6, Nexus 6P, Nexus 9, Android One, Nexus Player,
   3038 Pixel C, Pixel, and Pixel XL.</li>
   3039 <li><strong>Some Google devices</strong>: If an issue doesn't affect all Google
   3040 devices, the affected Google devices are listed in the <em>Updated Google
   3041 devices</em> column.</li>
   3042 <li><strong>No Google devices</strong>: If no Google devices running Android 7.0
   3043 are affected by the issue, the table will have "None" in the <em>Updated Google
   3044 devices</em> column. </li>
   3045 </ul>
   3046 <p><strong>4. What do the entries in the references column map to?</strong></p>
   3047 
   3048 <p>Entries under the <em>References</em> column of the vulnerability details table
   3049 may contain a prefix identifying the organization to which the reference value
   3050 belongs. These prefixes map as follows:</p>
   3051 
   3052 <table>
   3053   <tr>
   3054    <th>Prefix</th>
   3055    <th>Reference</th>
   3056   </tr>
   3057   <tr>
   3058    <td>A-</td>
   3059    <td>Android bug ID</td>
   3060   </tr>
   3061   <tr>
   3062    <td>QC-</td>
   3063    <td>Qualcomm reference number</td>
   3064   </tr>
   3065   <tr>
   3066    <td>M-</td>
   3067    <td>MediaTek reference number</td>
   3068   </tr>
   3069   <tr>
   3070    <td>N-</td>
   3071    <td>NVIDIA reference number</td>
   3072   </tr>
   3073   <tr>
   3074    <td>B-</td>
   3075    <td>Broadcom reference number</td>
   3076   </tr>
   3077 </table>
   3078 <h2 id="revisions">Revisions</h2>
   3079 <ul>
   3080 <li>May 01, 2017: Bulletin published.</li>
   3081 <li>May 02, 2017: Bulletin revised to include AOSP links.</li>
   3082 </ul>
   3083 </body>
   3084 </html>
   3085