1 <html devsite> 2 <head> 3 <title>Android Security BulletinJune 2017</title> 4 <meta name="project_path" value="/_project.yaml" /> 5 <meta name="book_path" value="/_book.yaml" /> 6 </head> 7 <body> 8 <!-- 9 Copyright 2017 The Android Open Source Project 10 11 Licensed under the Apache License, Version 2.0 (the "License"); 12 you may not use this file except in compliance with the License. 13 You may obtain a copy of the License at 14 15 http://www.apache.org/licenses/LICENSE-2.0 16 17 Unless required by applicable law or agreed to in writing, software 18 distributed under the License is distributed on an "AS IS" BASIS, 19 WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 20 See the License for the specific language governing permissions and 21 limitations under the License. 22 --> 23 <p><em>Published June 5, 2017 | Updated June 7, 2017</em></p> 24 25 <p>The Android Security Bulletin contains details of security vulnerabilities 26 affecting Android devices. Security patch levels of June 05, 2017 or later 27 address all of these issues. Refer to the <a 28 href="https://support.google.com/pixelphone/answer/4457705#pixel_phones&nexus_devices">Pixel 29 and Nexus update schedule</a> to learn how to check a device's security patch 30 level.</p> 31 32 <p>Partners were notified of the issues described in the bulletin at least a 33 month ago. Source code patches for these issues will be released to the Android 34 Open Source Project (AOSP) repository and linked from this bulletin. This 35 bulletin also includes links to patches outside of AOSP.</p> 36 37 <p>The most severe of these issues is a critical security vulnerability in Media 38 Framework that could enable a remote attacker using a specially crafted file to 39 cause memory corruption during media file and data processing. The <a 40 href="/security/overview/updates-resources.html#severity">severity 41 assessment</a> is based on the effect that exploiting the vulnerability would 42 possibly have on an affected device, assuming the platform and service 43 mitigations are turned off for development purposes or if successfully bypassed.</p> 44 45 <p>We have had no reports of active customer exploitation or abuse of these newly 46 reported issues. Refer to the 47 <a href="#mitigations">Android and Google Play Protect mitigations</a> 48 section for details on the <a 49 href="/security/enhancements/index.html">Android 50 security platform protections</a> and <a 51 href="https://www.android.com/play-protect">Google Play Protect</a>, 52 which improve the security of the Android platform.</p> 53 54 <p>We encourage all customers to accept these updates to their devices.</p> 55 56 <p class="note"><strong>Note:</strong> Information on the latest over-the-air update (OTA) and 57 firmware images for Google devices is available in the <a 58 href="#google-device-updates">Google device updates</a> section.</p> 59 60 <h2 id="announcements">Announcements</h2> 61 <ul> 62 <li>We've streamlined the monthly security bulletin to make 63 it easier to read. As part of this update, vulnerability information is 64 categorized by affected component, sorted by component name within a 65 security patch level, and Google device-specific information 66 is hosted in a <a href="#google-device-updates">dedicated section</a>.</li> 67 <li>This bulletin has two security patch level strings to provide Android 68 partners with the flexibility to more quickly fix a subset of vulnerabilities 69 that are similar across all Android devices. See <a 70 href="#common-questions-and-answers">Common questions and answers</a> for 71 additional information: 72 <ul> 73 <li><strong>2017-06-01</strong>: Partial security patch level string. This 74 security patch level string indicates that all issues associated with 2017-06-01 75 (and all previous security patch level strings) are addressed.</li> 76 <li><strong>2017-06-05</strong>: Complete security patch level string. This 77 security patch level string indicates that all issues associated with 2017-06-01 78 and 2017-06-05 (and all previous security patch level strings) are 79 addressed.</li> 80 </ul> 81 </li> 82 </ul> 83 84 <h2 id="mitigations">Android and Google Play Protect mitigations</h2> 85 <p>This is a summary of the mitigations provided by the <a 86 href="/security/enhancements/index.html">Android 87 security platform</a> and service protections such as 88 <a href="https://www.android.com/play-protect">Google Play Protect</a>. 89 These capabilities reduce the likelihood that security 90 vulnerabilities could be successfully exploited on Android.</p> 91 <ul> 92 <li>Exploitation for many issues on Android is made more difficult by 93 enhancements in newer versions of the Android platform. We encourage all users 94 to update to the latest version of Android where possible.</li> 95 <li>The Android security team actively monitors for abuse through 96 <a href="https://www.android.com/play-protect">Google Play Protect</a> 97 and warns users about <a 98 href="/security/reports/Google_Android_Security_PHA_classifications.pdf">Potentially 99 Harmful Applications</a>. Google Play Protect is enabled by default on devices 100 with <a href="http://www.android.com/gms">Google Mobile Services</a>, and is 101 especially important for users who install apps from outside of Google Play.</li> 102 </ul> 103 104 <h2 id="2017-06-01-details">2017-06-01 security patch levelVulnerability details</h2> 105 <p>In the sections below, we provide details for each of the security 106 vulnerabilities that apply to the 2017-06-01 patch level. Vulnerabilities are 107 grouped under the component that they affect. There is a description of the 108 issue and a table with the CVE, associated references, <a 109 href="#vulnerability-type">type of vulnerability</a>, <a 110 href="/security/overview/updates-resources.html#severity">severity</a>, 111 and updated AOSP versions (where applicable). When available, we link the public 112 change that addressed the issue to the bug ID, like the AOSP change list. When 113 multiple changes relate to a single bug, additional references are linked to 114 numbers following the bug ID.</p> 115 116 <h3 id="bluetooth">Bluetooth</h3> 117 <p>The most severe vulnerability in this section could enable a local malicious app 118 to access data outside of its permission levels.</p> 119 120 <table> 121 <col width="17%"> 122 <col width="19%"> 123 <col width="9%"> 124 <col width="14%"> 125 <col width="39%"> 126 <tr> 127 <th>CVE</th> 128 <th>References</th> 129 <th>Type</th> 130 <th>Severity</th> 131 <th>Updated AOSP versions</th> 132 </tr> 133 <tr> 134 <td>CVE-2017-0639</td> 135 <td><a href="https://android.googlesource.com/platform/packages/apps/Bluetooth/+/f196061addcc56878078e5684f2029ddbf7055ff">A-35310991</a></td> 136 <td>ID</td> 137 <td>High</td> 138 <td>4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2</td> 139 </tr> 140 <tr> 141 <td>CVE-2017-0645</td> 142 <td><a href="https://android.googlesource.com/platform/packages/apps/Bluetooth/+/14b7d7e1537af60b7bca6c7b9e55df0dc7c6bf41">A-35385327</a></td> 143 <td>EoP</td> 144 <td>Moderate</td> 145 <td>6.0.1, 7.0, 7.1.1, 7.1.2</td> 146 </tr> 147 <tr> 148 <td>CVE-2017-0646</td> 149 <td><a href="https://android.googlesource.com/platform/system/bt/+/2bcdf8ec7db12c5651c004601901f1fc25153f2c">A-33899337</a></td> 150 <td>ID</td> 151 <td>Moderate</td> 152 <td>4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2</td> 153 </tr> 154 </table> 155 <h3 id="libraries">Libraries</h3> 156 <p>The most severe vulnerability in this section could enable a remote attacker 157 using a specially crafted file execute arbitrary code within the context of an 158 unprivileged process.</p> 159 160 <table> 161 <col width="17%"> 162 <col width="19%"> 163 <col width="9%"> 164 <col width="14%"> 165 <col width="39%"> 166 <tr> 167 <th>CVE</th> 168 <th>References</th> 169 <th>Type</th> 170 <th>Severity</th> 171 <th>Updated AOSP versions</th> 172 </tr> 173 <tr> 174 <td>CVE-2015-8871</td> 175 <td>A-35443562<a href="#asterisk">*</a></td> 176 <td>RCE</td> 177 <td>High</td> 178 <td>5.0.2, 5.1.1, 6.0, 6.0.1</td> 179 </tr> 180 <tr> 181 <td>CVE-2016-8332</td> 182 <td>A-37761553<a href="#asterisk">*</a></td> 183 <td>RCE</td> 184 <td>High</td> 185 <td>5.0.2, 5.1.1, 6.0, 6.0.1</td> 186 </tr> 187 <tr> 188 <td>CVE-2016-5131</td> 189 <td><a href="https://android.googlesource.com/platform/external/libxml2/+/0eff71008becb7f2c2b4509708da4b79985948bb">A-36554209</a></td> 190 <td>RCE</td> 191 <td>High</td> 192 <td>4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2</td> 193 </tr> 194 <tr> 195 <td>CVE-2016-4658</td> 196 <td><a href="https://android.googlesource.com/platform/external/libxml2/+/8ea80f29ea5fdf383ee3ae59ce35e55421a339f8">A-36554207</a></td> 197 <td>RCE</td> 198 <td>High</td> 199 <td>4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2</td> 200 </tr> 201 <tr> 202 <td>CVE-2017-0663</td> 203 <td><a href="https://android.googlesource.com/platform/external/libxml2/+/521b88fbb6d18312923f0df653d045384b500ffc">A-37104170</a></td> 204 <td>RCE</td> 205 <td>High</td> 206 <td>4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2</td> 207 </tr> 208 <tr> 209 <td>CVE-2017-7376</td> 210 <td><a href="https://android.googlesource.com/platform/external/libxml2/+/51e0cb2e5ec18eaf6fb331bc573ff27b743898f4">A-36555370</a></td> 211 <td>RCE</td> 212 <td>High</td> 213 <td>4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2</td> 214 </tr> 215 <tr> 216 <td>CVE-2017-5056</td> 217 <td><a href="https://android.googlesource.com/platform/external/libxml2/+/3f571b1bb85cf56903f06bab3a820182115c5541">A-36809819</a></td> 218 <td>RCE</td> 219 <td>Moderate</td> 220 <td>4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2</td> 221 </tr> 222 <tr> 223 <td>CVE-2017-7375</td> 224 <td><a href="https://android.googlesource.com/platform/external/libxml2/+/308396a55280f69ad4112d4f9892f4cbeff042aa">A-36556310</a></td> 225 <td>RCE</td> 226 <td>Moderate</td> 227 <td>4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2</td> 228 </tr> 229 <tr> 230 <td>CVE-2017-0647</td> 231 <td><a href="https://android.googlesource.com/platform/system/core/+/3d6a43155c702bce0e7e2a93a67247b5ce3946a5">A-36392138</a></td> 232 <td>ID</td> 233 <td>Moderate</td> 234 <td>5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2</td> 235 </tr> 236 <tr> 237 <td>CVE-2016-1839</td> 238 <td><a href="https://android.googlesource.com/platform/external/libxml2/+/ff20cd797822dba8569ee518c44e6864d6b4ebfa">A-36553781</a></td> 239 <td>DoS</td> 240 <td>Moderate</td> 241 <td>4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2</td> 242 </tr> 243 </table> 244 <h3 id="media-framework">Media framework</h3> 245 <p>The most severe vulnerability in this section could enable a remote attacker 246 using a specially crafted file to cause memory corruption during media file and 247 data processing.</p> 248 249 <table> 250 <col width="17%"> 251 <col width="19%"> 252 <col width="9%"> 253 <col width="14%"> 254 <col width="39%"> 255 <tr> 256 <th>CVE</th> 257 <th>References</th> 258 <th>Type</th> 259 <th>Severity</th> 260 <th>Updated AOSP versions</th> 261 </tr> 262 <tr> 263 <td>CVE-2017-0637</td> 264 <td><a href="https://android.googlesource.com/platform/external/libhevc/+/ebaa71da6362c497310377df509651974401d258">A-34064500</a></td> 265 <td>RCE</td> 266 <td>Critical</td> 267 <td>5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2</td> 268 </tr> 269 <tr> 270 <td>CVE-2017-0391</td> 271 <td><a href="https://android.googlesource.com/platform/external/libhevc/+/14bc1678a80af5be7401cf750ab762ae8c75cc5a">A-32322258</a></td> 272 <td>DoS</td> 273 <td>High</td> 274 <td>5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2</td> 275 </tr> 276 <tr> 277 <td>CVE-2017-0640</td> 278 <td>A-33129467<a href="#asterisk">*</a></td> 279 <td>DoS</td> 280 <td>High</td> 281 <td>6.0, 6.0.1, 7.0, 7.1.1</td> 282 </tr> 283 <tr> 284 <td>CVE-2017-0641</td> 285 <td><a href="https://android.googlesource.com/platform/external/libvpx/+/698796fc930baecf5c3fdebef17e73d5d9a58bcb">A-34360591</a></td> 286 <td>DoS</td> 287 <td>High</td> 288 <td>4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2</td> 289 </tr> 290 <tr> 291 <td>CVE-2017-0642</td> 292 <td><a href="https://android.googlesource.com/platform/external/libhevc/+/913d9e8d93d6b81bb8eac3fc2c1426651f5b259d">A-34819017</a></td> 293 <td>DoS</td> 294 <td>High</td> 295 <td>5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1, 7.1.2</td> 296 </tr> 297 <tr> 298 <td>CVE-2017-0643</td> 299 <td>A-35645051<a href="#asterisk">*</a></td> 300 <td>DoS</td> 301 <td>High</td> 302 <td>5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1.1</td> 303 </tr> 304 <tr> 305 <td>CVE-2017-0644</td> 306 <td>A-35472997<a href="#asterisk">*</a></td> 307 <td>DoS</td> 308 <td>High</td> 309 <td>4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1</td> 310 </tr> 311 </table> 312 <h3 id="system-ui">System UI</h3> 313 <p>The most severe vulnerability in this section could enable an attacker using a 314 specially crafted file to execute arbitrary code within the context of an 315 unprivileged process.</p> 316 317 <table> 318 <col width="17%"> 319 <col width="19%"> 320 <col width="9%"> 321 <col width="14%"> 322 <col width="39%"> 323 <tr> 324 <th>CVE</th> 325 <th>References</th> 326 <th>Type</th> 327 <th>Severity</th> 328 <th>Updated AOSP versions</th> 329 </tr> 330 <tr> 331 <td>CVE-2017-0638</td> 332 <td><a href="https://android.googlesource.com/platform/external/libgdx/+/a98943dd4aece3024f023f00256607d50dcbcd1e">A-36368305</a></td> 333 <td>RCE</td> 334 <td>High</td> 335 <td>7.1.1, 7.1.2</td> 336 </tr> 337 </table> 338 <h2 id="2017-06-05-details">2017-06-05 339 security patch levelVulnerability details</h2> 340 <p>In the sections below, we provide details for each of the security 341 vulnerabilities that apply to the 2017-06-05 patch level. Vulnerabilities are 342 grouped under the component that they affect and include details such as the 343 CVE, associated references, <a 344 href="#vulnerability-type">type of vulnerability</a>, <a 345 href="/security/overview/updates-resources.html#severity">severity</a>, 346 component (where 347 applicable), and updated AOSP versions (where applicable). When available, we 348 link the public change that addressed the issue to the bug ID, like the AOSP 349 change list. When multiple changes relate to a single bug, additional references 350 are linked to numbers following the bug ID.</p> 351 352 <h3 id="kernel-components">Kernel components</h3> 353 <p>The most severe vulnerability in this section could enable a local malicious app 354 to execute arbitrary code within the context of the kernel.</p> 355 356 <table> 357 <col width="17%"> 358 <col width="19%"> 359 <col width="9%"> 360 <col width="14%"> 361 <col width="39%"> 362 <tr> 363 <th>CVE</th> 364 <th>References</th> 365 <th>Type</th> 366 <th>Severity</th> 367 <th>Component</th> 368 </tr> 369 <tr> 370 <td>CVE-2017-0648</td> 371 <td>A-36101220<a href="#asterisk">*</a></td> 372 <td>EoP</td> 373 <td>High</td> 374 <td>FIQ debugger</td> 375 </tr> 376 <tr> 377 <td>CVE-2017-0651</td> 378 <td>A-35644815<a href="#asterisk">*</a></td> 379 <td>ID</td> 380 <td>Low</td> 381 <td>ION subsystem</td> 382 </tr> 383 </table> 384 <h3 id="libraries-05">Libraries</h3> 385 <p>The most severe vulnerability in this section could enable a remote attacker 386 using a specially crafted file to gain access to sensitive information.</p> 387 388 <table> 389 <col width="17%"> 390 <col width="19%"> 391 <col width="9%"> 392 <col width="14%"> 393 <col width="39%"> 394 <tr> 395 <th>CVE</th> 396 <th>References</th> 397 <th>Type</th> 398 <th>Severity</th> 399 <th>Updated AOSP versions</th> 400 </tr> 401 <tr> 402 <td>CVE-2015-7995</td> 403 <td>A-36810065<a href="#asterisk">*</a></td> 404 <td>ID</td> 405 <td>Moderate</td> 406 <td>4.4.4</td> 407 </tr> 408 </table> 409 <h3 id="mediatek-components">MediaTek components</h3> 410 <p>The most severe vulnerability in this section could enable a local malicious app 411 to execute arbitrary code within the context of the kernel.</p> 412 413 <table> 414 <col width="17%"> 415 <col width="19%"> 416 <col width="9%"> 417 <col width="14%"> 418 <col width="39%"> 419 <tr> 420 <th>CVE</th> 421 <th>References</th> 422 <th>Type</th> 423 <th>Severity</th> 424 <th>Component</th> 425 </tr> 426 <tr> 427 <td>CVE-2017-0636</td> 428 <td>A-35310230<a href="#asterisk">*</a><br> 429 M-ALPS03162263</td> 430 <td>EoP</td> 431 <td>High</td> 432 <td>Command queue driver</td> 433 </tr> 434 <tr> 435 <td>CVE-2017-0649</td> 436 <td>A-34468195<a href="#asterisk">*</a><br> 437 M-ALPS03162283</td> 438 <td>EoP</td> 439 <td>Moderate</td> 440 <td>Sound driver</td> 441 </tr> 442 </table> 443 <h3 id="nvidia-components">NVIDIA components</h3> 444 <p>The most severe vulnerability in this section could enable a local malicious app 445 to execute arbitrary code within the context of the kernel.</p> 446 447 <table> 448 <col width="17%"> 449 <col width="19%"> 450 <col width="9%"> 451 <col width="14%"> 452 <col width="39%"> 453 <tr> 454 <th>CVE</th> 455 <th>References</th> 456 <th>Type</th> 457 <th>Severity</th> 458 <th>Component</th> 459 </tr> 460 <tr> 461 <td>CVE-2017-6247</td> 462 <td>A-34386301<a href="#asterisk">*</a><br> 463 N-CVE-2017-6247</td> 464 <td>EoP</td> 465 <td>High</td> 466 <td>Sound driver</td> 467 </tr> 468 <tr> 469 <td>CVE-2017-6248</td> 470 <td>A-34372667<a href="#asterisk">*</a><br> 471 N-CVE-2017-6248</td> 472 <td>EoP</td> 473 <td>Moderate</td> 474 <td>Sound driver</td> 475 </tr> 476 <tr> 477 <td>CVE-2017-6249</td> 478 <td>A-34373711<a href="#asterisk">*</a><br> 479 N-CVE-2017-6249</td> 480 <td>EoP</td> 481 <td>Moderate</td> 482 <td>Sound driver</td> 483 </tr> 484 </table> 485 <h3 id="qualcomm-components">Qualcomm components</h3> 486 <p>The most severe vulnerability in this section could enable a proximate attacker 487 to execute arbitrary code within the context of the kernel.</p> 488 489 <table> 490 <col width="17%"> 491 <col width="19%"> 492 <col width="9%"> 493 <col width="14%"> 494 <col width="39%"> 495 <tr> 496 <th>CVE</th> 497 <th>References</th> 498 <th>Type</th> 499 <th>Severity</th> 500 <th>Component</th> 501 </tr> 502 <tr> 503 <td>CVE-2017-7371</td> 504 <td>A-36250786<br> 505 <a href="https://source.codeaurora.org/quic/la/kernel/msm-4.4/commit/?id=e02e63b8014f7a0a5ea17a5196fb4ef1283fd1fd">QC-CR#1101054</a></td> 506 <td>RCE</td> 507 <td>Critical</td> 508 <td>Bluetooth driver</td> 509 </tr> 510 <tr> 511 <td>CVE-2017-7365</td> 512 <td>A-32449913<br> 513 <a href="https://source.codeaurora.org/quic/la//kernel/lk/commit/?id=da49bf21d1c19a6293d33c985066dc0273c476db">QC-CR#1017009</a></td> 514 <td>EoP</td> 515 <td>High</td> 516 <td>Bootloader</td> 517 </tr> 518 <tr> 519 <td>CVE-2017-7366</td> 520 <td>A-36252171<br> 521 <a 522 href="https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=f4c9ffd6cd7960265f38e285ac43cbecf2459e45">QC-CR#1036161</a> 523 [<a 524 href="https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=7c4d5736d32f91f0cafe6cd86d00e26389970b00">2</a>]</td> 525 <td>EoP</td> 526 <td>High</td> 527 <td>GPU driver</td> 528 </tr> 529 <tr> 530 <td>CVE-2017-7367</td> 531 <td>A-34514708<br> 532 <a href="https://source.codeaurora.org/quic/la//kernel/lk/commit/?id=07174af1af48c60a41c7136f0c80ffdf4ccc0b57">QC-CR#1008421</a></td> 533 <td>DoS</td> 534 <td>High</td> 535 <td>Bootloader</td> 536 </tr> 537 <tr> 538 <td>CVE-2016-5861</td> 539 <td>A-36251375<br> 540 <a href="https://source.codeaurora.org/quic/la//kernel/msm-4.4/commit/?id=cf3c97b8b6165f13810e530068fbf94b07f1f77d">QC-CR#1103510</a></td> 541 <td>EoP</td> 542 <td>Moderate</td> 543 <td>Video driver</td> 544 </tr> 545 <tr> 546 <td>CVE-2016-5864</td> 547 <td>A-36251231<br> 548 <a href="https://source.codeaurora.org/quic/la/kernel/msm-4.4/commit/?id=cbc21ceb69cb7bca0643423a7ca982abce3ce50a">QC-CR#1105441</a></td> 549 <td>EoP</td> 550 <td>Moderate</td> 551 <td>Sound driver</td> 552 </tr> 553 <tr> 554 <td>CVE-2017-6421</td> 555 <td>A-36251986<br> 556 <a href="https://source.codeaurora.org/quic/la//kernel/msm-4.4/commit/?id=be42c7ff1f0396484882451fd18f47144c8f1b6b">QC-CR#1110563</a></td> 557 <td>EoP</td> 558 <td>Moderate</td> 559 <td>MStar touchscreen driver</td> 560 </tr> 561 <tr> 562 <td>CVE-2017-7364</td> 563 <td>A-36252179<br> 564 <a href="https://source.codeaurora.org/quic/la/kernel/msm-4.4/commit/?id=3ce6c47d2142fcd2c4c1181afe08630aaae5a267">QC-CR#1113926</a></td> 565 <td>EoP</td> 566 <td>Moderate</td> 567 <td>Video driver</td> 568 </tr> 569 <tr> 570 <td>CVE-2017-7368</td> 571 <td>A-33452365<br> 572 <a href="https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=143ef972be1621458930ea3fc1def5ebce7b0c5d">QC-CR#1103085</a></td> 573 <td>EoP</td> 574 <td>Moderate</td> 575 <td>Sound driver</td> 576 </tr> 577 <tr> 578 <td>CVE-2017-7369</td> 579 <td>A-33751424<br> 580 <a href="https://source.codeaurora.org/quic/la//kernel/msm-3.10/commit/?id=75ed08a822cf378ffed0d2f177d06555bd77a006">QC-CR#2009216</a> 581 [<a href="https://source.codeaurora.org/quic/la//kernel/msm-3.18/commit/?id=ae8f1d5f60644983aba7fbab469d0e542a187c6e">2</a>]</td> 582 <td>EoP</td> 583 <td>Moderate</td> 584 <td>Sound driver</td> 585 </tr> 586 <tr> 587 <td>CVE-2017-7370</td> 588 <td>A-34328139<br> 589 <a href="https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=970edf007fbe64b094437541a42477d653802d85">QC-CR#2006159</a></td> 590 <td>EoP</td> 591 <td>Moderate</td> 592 <td>Video driver</td> 593 </tr> 594 <tr> 595 <td>CVE-2017-7372</td> 596 <td>A-36251497<br> 597 <a href="https://source.codeaurora.org/quic/la//kernel/msm-3.18/commit/?id=1806be003731d6d4be55e5b940d14ab772839e13">QC-CR#1110068</a></td> 598 <td>EoP</td> 599 <td>Moderate</td> 600 <td>Video driver</td> 601 </tr> 602 <tr> 603 <td>CVE-2017-7373</td> 604 <td>A-36251984<br> 605 <a href="https://source.codeaurora.org/quic/la//kernel/msm-4.4/commit/?id=e5eb0d3aa6fe62ee437a2269a1802b1a72f61b75">QC-CR#1090244</a></td> 606 <td>EoP</td> 607 <td>Moderate</td> 608 <td>Video driver</td> 609 </tr> 610 <tr> 611 <td>CVE-2017-8233</td> 612 <td>A-34621613<br> 613 <a href="https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=64b7bc25e019dd07e8042e0a6ec6dc6a1dd0c385">QC-CR#2004036</a></td> 614 <td>EoP</td> 615 <td>Moderate</td> 616 <td>Camera driver</td> 617 </tr> 618 <tr> 619 <td>CVE-2017-8234</td> 620 <td>A-36252121<br> 621 <a href="https://source.codeaurora.org/quic/la/kernel/msm-3.10/commit/?id=6266f954a52641f550ef71653ea83c80bdd083be">QC-CR#832920</a></td> 622 <td>EoP</td> 623 <td>Moderate</td> 624 <td>Camera driver</td> 625 </tr> 626 <tr> 627 <td>CVE-2017-8235</td> 628 <td>A-36252376<br> 629 <a href="https://source.codeaurora.org/quic/la/kernel/msm-4.4/commit/?id=7e4424a1b5f6a6536066cca7aac2c3a23fd39f6f">QC-CR#1083323</a></td> 630 <td>EoP</td> 631 <td>Moderate</td> 632 <td>Camera driver</td> 633 </tr> 634 <tr> 635 <td>CVE-2017-8236</td> 636 <td>A-35047217<br> 637 <a href="https://source.codeaurora.org/quic/la//kernel/msm-3.18/commit/?id=cf0d31bc3b04cf2db7737d36b11a5bf50af0c1db">QC-CR#2009606</a></td> 638 <td>EoP</td> 639 <td>Moderate</td> 640 <td>IPA driver</td> 641 </tr> 642 <tr> 643 <td>CVE-2017-8237</td> 644 <td>A-36252377<br> 645 <a href="https://source.codeaurora.org/quic/la//kernel/msm-3.18/commit/?id=342d16ac6fb01e304ec75344c693257e00628ecf">QC-CR#1110522</a></td> 646 <td>EoP</td> 647 <td>Moderate</td> 648 <td>Networking driver</td> 649 </tr> 650 <tr> 651 <td>CVE-2017-8242</td> 652 <td>A-34327981<br> 653 <a href="https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=6a3b8afdf97e77c0b64005b23fa6d32025d922e5">QC-CR#2009231</a></td> 654 <td>EoP</td> 655 <td>Moderate</td> 656 <td>Secure Execution Environment Communicator driver</td> 657 </tr> 658 <tr> 659 <td>CVE-2017-8239</td> 660 <td>A-36251230<br> 661 <a href="https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=01db0e012f86b8ba6974e5cb9905261a552a0610">QC-CR#1091603</a></td> 662 <td>ID</td> 663 <td>Moderate</td> 664 <td>Camera driver</td> 665 </tr> 666 <tr> 667 <td>CVE-2017-8240</td> 668 <td>A-36251985<br> 669 <a href="https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=22b8b6608174c1308208d5bc6c143f4998744547">QC-CR#856379</a></td> 670 <td>ID</td> 671 <td>Moderate</td> 672 <td>Pin controller driver</td> 673 </tr> 674 <tr> 675 <td>CVE-2017-8241</td> 676 <td>A-34203184<br> 677 <a href="https://source.codeaurora.org/quic/la//platform/vendor/qcom-opensource/wlan/qcacld-2.0/commit/?id=90213394b7efb28fa511b2eaebc1343ae3b54724">QC-CR#1069175</a></td> 678 <td>ID</td> 679 <td>Low</td> 680 <td>Wi-Fi driver</td> 681 </tr> 682 </table> 683 <h3 id="synaptics-components">Synaptics components</h3> 684 <p>The most severe vulnerability in this section could enable a local malicious app 685 to access data outside of its permission levels.</p> 686 687 <table> 688 <col width="17%"> 689 <col width="19%"> 690 <col width="9%"> 691 <col width="14%"> 692 <col width="39%"> 693 <tr> 694 <th>CVE</th> 695 <th>References</th> 696 <th>Type</th> 697 <th>Severity</th> 698 <th>Component</th> 699 </tr> 700 <tr> 701 <td>CVE-2017-0650</td> 702 <td>A-35472278<a href="#asterisk">*</a></td> 703 <td>EoP</td> 704 <td>Low</td> 705 <td>Touchscreen driver</td> 706 </tr> 707 </table> 708 <h3 id="qualcomm-closed-source-components">Qualcomm closed-source 709 components</h3> 710 <p>These vulnerabilities affect Qualcomm components and are described in further 711 detail in Qualcomm AMSS security bulletins from 20142016. They are included in 712 this Android security bulletin to associate their fixes with an Android security 713 patch level. Fixes for these vulnerabilities are available directly from Qualcomm.</p> 714 715 <table> 716 <col width="17%"> 717 <col width="19%"> 718 <col width="9%"> 719 <col width="14%"> 720 <col width="39%"> 721 <tr> 722 <th>CVE</th> 723 <th>References</th> 724 <th>Type</th> 725 <th>Severity</th> 726 <th>Component</th> 727 </tr> 728 <tr> 729 <td>CVE-2014-9960</td> 730 <td>A-37280308<a href="#asterisk">*</a><br> 731 QC-CR#381837</td> 732 <td>N/A</td> 733 <td>Critical</td> 734 <td>Closed-source component</td> 735 </tr> 736 <tr> 737 <td>CVE-2014-9961</td> 738 <td>A-37279724<a href="#asterisk">*</a><br> 739 QC-CR#581093</td> 740 <td>N/A</td> 741 <td>Critical</td> 742 <td>Closed-source component</td> 743 </tr> 744 <tr> 745 <td>CVE-2014-9953</td> 746 <td>A-36714770<a href="#asterisk">*</a><br> 747 QC-CR#642173</td> 748 <td>N/A</td> 749 <td>Critical</td> 750 <td>Closed-source component</td> 751 </tr> 752 <tr> 753 <td>CVE-2014-9967</td> 754 <td>A-37281466<a href="#asterisk">*</a><br> 755 QC-CR#739110</td> 756 <td>N/A</td> 757 <td>Critical</td> 758 <td>Closed-source component</td> 759 </tr> 760 <tr> 761 <td>CVE-2015-9026</td> 762 <td>A-37277231<a href="#asterisk">*</a><br> 763 QC-CR#748397</td> 764 <td>N/A</td> 765 <td>Critical</td> 766 <td>Closed-source component</td> 767 </tr> 768 <tr> 769 <td>CVE-2015-9027</td> 770 <td>A-37279124<a href="#asterisk">*</a><br> 771 QC-CR#748407</td> 772 <td>N/A</td> 773 <td>Critical</td> 774 <td>Closed-source component</td> 775 </tr> 776 <tr> 777 <td>CVE-2015-9008</td> 778 <td>A-36384689<a href="#asterisk">*</a><br> 779 QC-CR#762111</td> 780 <td>N/A</td> 781 <td>Critical</td> 782 <td>Closed-source component</td> 783 </tr> 784 <tr> 785 <td>CVE-2015-9009</td> 786 <td>A-36393600<a href="#asterisk">*</a><br> 787 QC-CR#762182</td> 788 <td>N/A</td> 789 <td>Critical</td> 790 <td>Closed-source component</td> 791 </tr> 792 <tr> 793 <td>CVE-2015-9010</td> 794 <td>A-36393101<a href="#asterisk">*</a><br> 795 QC-CR#758752</td> 796 <td>N/A</td> 797 <td>Critical</td> 798 <td>Closed-source component</td> 799 </tr> 800 <tr> 801 <td>CVE-2015-9011</td> 802 <td>A-36714882<a href="#asterisk">*</a><br> 803 QC-CR#762167</td> 804 <td>N/A</td> 805 <td>Critical</td> 806 <td>Closed-source component</td> 807 </tr> 808 <tr> 809 <td>CVE-2015-9024</td> 810 <td>A-37265657<a href="#asterisk">*</a><br> 811 QC-CR#740680</td> 812 <td>N/A</td> 813 <td>Critical</td> 814 <td>Closed-source component</td> 815 </tr> 816 <tr> 817 <td>CVE-2015-9012</td> 818 <td>A-36384691<a href="#asterisk">*</a><br> 819 QC-CR#746617</td> 820 <td>N/A</td> 821 <td>Critical</td> 822 <td>Closed-source component</td> 823 </tr> 824 <tr> 825 <td>CVE-2015-9013</td> 826 <td>A-36393251<a href="#asterisk">*</a><br> 827 QC-CR#814373</td> 828 <td>N/A</td> 829 <td>Critical</td> 830 <td>Closed-source component</td> 831 </tr> 832 <tr> 833 <td>CVE-2015-9014</td> 834 <td>A-36393750<a href="#asterisk">*</a><br> 835 QC-CR#855220</td> 836 <td>N/A</td> 837 <td>Critical</td> 838 <td>Closed-source component</td> 839 </tr> 840 <tr> 841 <td>CVE-2015-9015</td> 842 <td>A-36714120<a href="#asterisk">*</a><br> 843 QC-CR#701858</td> 844 <td>N/A</td> 845 <td>Critical</td> 846 <td>Closed-source component</td> 847 </tr> 848 <tr> 849 <td>CVE-2015-9029</td> 850 <td>A-37276981<a href="#asterisk">*</a><br> 851 QC-CR#827837</td> 852 <td>N/A</td> 853 <td>Critical</td> 854 <td>Closed-source component</td> 855 </tr> 856 <tr> 857 <td>CVE-2016-10338</td> 858 <td>A-37277738<a href="#asterisk">*</a><br> 859 QC-CR#987699</td> 860 <td>N/A</td> 861 <td>Critical</td> 862 <td>Closed-source component</td> 863 </tr> 864 <tr> 865 <td>CVE-2016-10336</td> 866 <td>A-37278436<a href="#asterisk">*</a><br> 867 QC-CR#973605</td> 868 <td>N/A</td> 869 <td>Critical</td> 870 <td>Closed-source component</td> 871 </tr> 872 <tr> 873 <td>CVE-2016-10333</td> 874 <td>A-37280574<a href="#asterisk">*</a><br> 875 QC-CR#947438</td> 876 <td>N/A</td> 877 <td>Critical</td> 878 <td>Closed-source component</td> 879 </tr> 880 <tr> 881 <td>CVE-2016-10341</td> 882 <td>A-37281667<a href="#asterisk">*</a><br> 883 QC-CR#991476</td> 884 <td>N/A</td> 885 <td>Critical</td> 886 <td>Closed-source component</td> 887 </tr> 888 <tr> 889 <td>CVE-2016-10335</td> 890 <td>A-37282802<a href="#asterisk">*</a><br> 891 QC-CR#961142</td> 892 <td>N/A</td> 893 <td>Critical</td> 894 <td>Closed-source component</td> 895 </tr> 896 <tr> 897 <td>CVE-2016-10340</td> 898 <td>A-37280614<a href="#asterisk">*</a><br> 899 QC-CR#989028</td> 900 <td>N/A</td> 901 <td>Critical</td> 902 <td>Closed-source component</td> 903 </tr> 904 <tr> 905 <td>CVE-2016-10334</td> 906 <td>A-37280664<a href="#asterisk">*</a><br> 907 QC-CR#949933</td> 908 <td>N/A</td> 909 <td>Critical</td> 910 <td>Closed-source component</td> 911 </tr> 912 <tr> 913 <td>CVE-2016-10339</td> 914 <td>A-37280575<a href="#asterisk">*</a><br> 915 QC-CR#988502</td> 916 <td>N/A</td> 917 <td>Critical</td> 918 <td>Closed-source component</td> 919 </tr> 920 <tr> 921 <td>CVE-2016-10298</td> 922 <td>A-36393252<a href="#asterisk">*</a><br> 923 QC-CR#1020465</td> 924 <td>N/A</td> 925 <td>Critical</td> 926 <td>Closed-source component</td> 927 </tr> 928 <tr> 929 <td>CVE-2016-10299</td> 930 <td>A-32577244<a href="#asterisk">*</a><br> 931 QC-CR#1058511</td> 932 <td>N/A</td> 933 <td>Critical</td> 934 <td>Closed-source component</td> 935 </tr> 936 <tr> 937 <td>CVE-2014-9954</td> 938 <td>A-36388559<a href="#asterisk">*</a><br> 939 QC-CR#552880</td> 940 <td>N/A</td> 941 <td>High</td> 942 <td>Closed-source component</td> 943 </tr> 944 <tr> 945 <td>CVE-2014-9955</td> 946 <td>A-36384686<a href="#asterisk">*</a><br> 947 QC-CR#622701</td> 948 <td>N/A</td> 949 <td>High</td> 950 <td>Closed-source component</td> 951 </tr> 952 <tr> 953 <td>CVE-2014-9956</td> 954 <td>A-36389611<a href="#asterisk">*</a><br> 955 QC-CR#638127</td> 956 <td>N/A</td> 957 <td>High</td> 958 <td>Closed-source component</td> 959 </tr> 960 <tr> 961 <td>CVE-2014-9957</td> 962 <td>A-36387564<a href="#asterisk">*</a><br> 963 QC-CR#638984</td> 964 <td>N/A</td> 965 <td>High</td> 966 <td>Closed-source component</td> 967 </tr> 968 <tr> 969 <td>CVE-2014-9958</td> 970 <td>A-36384774<a href="#asterisk">*</a><br> 971 QC-CR#638135</td> 972 <td>N/A</td> 973 <td>High</td> 974 <td>Closed-source component</td> 975 </tr> 976 <tr> 977 <td>CVE-2014-9962</td> 978 <td>A-37275888<a href="#asterisk">*</a><br> 979 QC-CR#656267</td> 980 <td>N/A</td> 981 <td>High</td> 982 <td>Closed-source component</td> 983 </tr> 984 <tr> 985 <td>CVE-2014-9963</td> 986 <td>A-37276741<a href="#asterisk">*</a><br> 987 QC-CR#657771</td> 988 <td>N/A</td> 989 <td>High</td> 990 <td>Closed-source component</td> 991 </tr> 992 <tr> 993 <td>CVE-2014-9959</td> 994 <td>A-36383694<a href="#asterisk">*</a><br> 995 QC-CR#651900</td> 996 <td>N/A</td> 997 <td>High</td> 998 <td>Closed-source component</td> 999 </tr> 1000 <tr> 1001 <td>CVE-2014-9964</td> 1002 <td>A-37280321<a href="#asterisk">*</a><br> 1003 QC-CR#680778</td> 1004 <td>N/A</td> 1005 <td>High</td> 1006 <td>Closed-source component</td> 1007 </tr> 1008 <tr> 1009 <td>CVE-2014-9965</td> 1010 <td>A-37278233<a href="#asterisk">*</a><br> 1011 QC-CR#711585</td> 1012 <td>N/A</td> 1013 <td>High</td> 1014 <td>Closed-source component</td> 1015 </tr> 1016 <tr> 1017 <td>CVE-2014-9966</td> 1018 <td>A-37282854<a href="#asterisk">*</a><br> 1019 QC-CR#727398</td> 1020 <td>N/A</td> 1021 <td>High</td> 1022 <td>Closed-source component</td> 1023 </tr> 1024 <tr> 1025 <td>CVE-2015-9023</td> 1026 <td>A-37276138<a href="#asterisk">*</a><br> 1027 QC-CR#739802</td> 1028 <td>N/A</td> 1029 <td>High</td> 1030 <td>Closed-source component</td> 1031 </tr> 1032 <tr> 1033 <td>CVE-2015-9020</td> 1034 <td>A-37276742<a href="#asterisk">*</a><br> 1035 QC-CR#733455</td> 1036 <td>N/A</td> 1037 <td>High</td> 1038 <td>Closed-source component</td> 1039 </tr> 1040 <tr> 1041 <td>CVE-2015-9021</td> 1042 <td>A-37276743<a href="#asterisk">*</a><br> 1043 QC-CR#735148</td> 1044 <td>N/A</td> 1045 <td>High</td> 1046 <td>Closed-source component</td> 1047 </tr> 1048 <tr> 1049 <td>CVE-2015-9025</td> 1050 <td>A-37276744<a href="#asterisk">*</a><br> 1051 QC-CR#743985</td> 1052 <td>N/A</td> 1053 <td>High</td> 1054 <td>Closed-source component</td> 1055 </tr> 1056 <tr> 1057 <td>CVE-2015-9022</td> 1058 <td>A-37280226<a href="#asterisk">*</a><br> 1059 QC-CR#736146</td> 1060 <td>N/A</td> 1061 <td>High</td> 1062 <td>Closed-source component</td> 1063 </tr> 1064 <tr> 1065 <td>CVE-2015-9028</td> 1066 <td>A-37277982<a href="#asterisk">*</a><br> 1067 QC-CR#762764</td> 1068 <td>N/A</td> 1069 <td>High</td> 1070 <td>Closed-source component</td> 1071 </tr> 1072 <tr> 1073 <td>CVE-2015-9031</td> 1074 <td>A-37275889<a href="#asterisk">*</a><br> 1075 QC-CR#866015</td> 1076 <td>N/A</td> 1077 <td>High</td> 1078 <td>Closed-source component</td> 1079 </tr> 1080 <tr> 1081 <td>CVE-2015-9032</td> 1082 <td>A-37279125<a href="#asterisk">*</a><br> 1083 QC-CR#873202</td> 1084 <td>N/A</td> 1085 <td>High</td> 1086 <td>Closed-source component</td> 1087 </tr> 1088 <tr> 1089 <td>CVE-2015-9033</td> 1090 <td>A-37276139<a href="#asterisk">*</a><br> 1091 QC-CR#892541</td> 1092 <td>N/A</td> 1093 <td>High</td> 1094 <td>Closed-source component</td> 1095 </tr> 1096 <tr> 1097 <td>CVE-2015-9030</td> 1098 <td>A-37282907<a href="#asterisk">*</a><br> 1099 QC-CR#854667</td> 1100 <td>N/A</td> 1101 <td>High</td> 1102 <td>Closed-source component</td> 1103 </tr> 1104 <tr> 1105 <td>CVE-2016-10332</td> 1106 <td>A-37282801<a href="#asterisk">*</a><br> 1107 QC-CR#906713<br> 1108 QC-CR#917701<br> 1109 QC-CR#917702</td> 1110 <td>N/A</td> 1111 <td>High</td> 1112 <td>Closed-source component</td> 1113 </tr> 1114 <tr> 1115 <td>CVE-2016-10337</td> 1116 <td>A-37280665<a href="#asterisk">*</a><br> 1117 QC-CR#977632</td> 1118 <td>N/A</td> 1119 <td>High</td> 1120 <td>Closed-source component</td> 1121 </tr> 1122 <tr> 1123 <td>CVE-2016-10342</td> 1124 <td>A-37281763<a href="#asterisk">*</a><br> 1125 QC-CR#988941</td> 1126 <td>N/A</td> 1127 <td>High</td> 1128 <td>Closed-source component</td> 1129 </tr> 1130 </table> 1131 <h2 id="google-device-updates">Google device updates</h2> 1132 <p>This table contains the security patch level in the latest over-the-air update 1133 (OTA) and firmware images for Google devices. The Google device firmware images 1134 are available on the <a 1135 href="https://developers.google.com/android/nexus/images">Google Developer 1136 site</a>.</p> 1137 1138 <table> 1139 <col width="25%"> 1140 <col width="75%"> 1141 <tr> 1142 <th>Google device</th> 1143 <th>Security patch level</th> 1144 </tr> 1145 <tr> 1146 <td>Pixel / Pixel XL</td> 1147 <td>June 05, 2017</td> 1148 </tr> 1149 <tr> 1150 <td>Nexus 5X</td> 1151 <td>June 05, 2017</td> 1152 </tr> 1153 <tr> 1154 <td>Nexus 6</td> 1155 <td>June 05, 2017</td> 1156 </tr> 1157 <tr> 1158 <td>Nexus 6P</td> 1159 <td>June 05, 2017</td> 1160 </tr> 1161 <tr> 1162 <td>Nexus 9</td> 1163 <td>June 05, 2017</td> 1164 </tr> 1165 <tr> 1166 <td>Nexus Player</td> 1167 <td>June 05, 2017</td> 1168 </tr> 1169 <tr> 1170 <td>Pixel C</td> 1171 <td>June 05, 2017</td> 1172 </tr> 1173 </table> 1174 <h2 id="acknowledgements">Acknowledgements</h2> 1175 <p>We would like to thank these researchers for their contributions:</p> 1176 1177 <table> 1178 <col width="17%"> 1179 <col width="83%"> 1180 <tr> 1181 <th>CVEs</th> 1182 <th>Researchers</th> 1183 </tr> 1184 <tr> 1185 <td>CVE-2017-0643, CVE-2017-0641</td> 1186 <td>Ecular Xu() of Trend Micro</td> 1187 </tr> 1188 <tr> 1189 <td>CVE-2017-0645, CVE-2017-0639</td> 1190 <td>En He (<a href="https://twitter.com/heeeeen4x">@heeeeen4x</a>) and Bo Liu 1191 of <a href="http://www.ms509.com">MS509Team</a></td> 1192 </tr> 1193 <tr> 1194 <td>CVE-2017-0649</td> 1195 <td>Gengjia Chen (<a 1196 href="https://twitter.com/chengjia4574">@chengjia4574</a>) and <a 1197 href="http://weibo.com/jfpan">pjf</a> of IceSword Lab, Qihoo 360 Technology Co. 1198 Ltd.</td> 1199 </tr> 1200 <tr> 1201 <td>CVE-2017-0646</td> 1202 <td>Godzheng ( -<a 1203 href="https://twitter.com/VirtualSeekers">@VirtualSeekers</a>) of Tencent PC 1204 Manager</td> 1205 </tr> 1206 <tr> 1207 <td>CVE-2017-0636</td> 1208 <td>Jake Corina and Nick Stephens of Shellphish Grill Team</td> 1209 </tr> 1210 <tr> 1211 <td>CVE-2017-8233</td> 1212 <td>Jianqiang Zhao (<a 1213 href="https://twitter.com/jianqiangzhao">@jianqiangzhao</a>) and <a 1214 href="http://weibo.com/jfpan">pjf </a>of IceSword Lab, Qihoo 360</td> 1215 </tr> 1216 <tr> 1217 <td>CVE-2017-7368</td> 1218 <td>Lubo Zhang (<a 1219 href="mailto:zlbzlb815 (a] 163.com">zlbzlb815 (a] 163.com</a>),Yuan-Tsung Lo (<a 1220 href="mailto:computernik (a] gmail.com">computernik (a] gmail.com</a>), and Xuxian Jiang 1221 of <a href="http://c0reteam.org">C0RE Team</a></td> 1222 </tr> 1223 <tr> 1224 <td>CVE-2017-8242</td> 1225 <td>Nathan Crandall (<a href="https://twitter.com/natecray">@natecray</a>) of 1226 Tesla's Product Security Team</td> 1227 </tr> 1228 <tr> 1229 <td>CVE-2017-0650</td> 1230 <td>Omer Shwartz, Amir Cohen, Dr. Asaf Shabtai, and Dr. Yossi Oren of Ben 1231 Gurion University Cyber Lab</td> 1232 </tr> 1233 <tr> 1234 <td>CVE-2017-0648</td> 1235 <td>Roee Hay (<a href="https://twitter.com/roeehay">@roeehay</a>) of <a 1236 href="https://alephsecurity.com/">Aleph Research</a>, HCL Technologies</td> 1237 </tr> 1238 <tr> 1239 <td>CVE-2017-7369, CVE-2017-6249, CVE-2017-6247, CVE-2017-6248</td> 1240 <td>sevenshen (<a href="https://twitter.com/lingtongshen">@lingtongshen</a>) 1241 of TrendMicro</td> 1242 </tr> 1243 <tr> 1244 <td>CVE-2017-0642, CVE-2017-0637, CVE-2017-0638</td> 1245 <td>Vasily Vasiliev</td> 1246 </tr> 1247 <tr> 1248 <td>CVE-2017-0640</td> 1249 <td>V.E.O (<a href="https://twitter.com/vysea">@VYSEa</a>) of <a 1250 href="http://blog.trendmicro.com/trendlabs-security-intelligence/category/mobile/">Mobile 1251 Threat Response Team</a>, <a href="http://www.trendmicro.com">Trend Micro</a></td> 1252 </tr> 1253 <tr> 1254 <td>CVE-2017-8236</td> 1255 <td>Xiling Gong of Tencent Security Platform Department</td> 1256 </tr> 1257 <tr> 1258 <td>CVE-2017-0647</td> 1259 <td>Yangkang (<a href="https://twitter.com/dnpushme">@dnpushme</a>) and 1260 Liyadong of Qex Team, Qihoo 360</td> 1261 </tr> 1262 <tr> 1263 <td>CVE-2017-7370</td> 1264 <td>Yonggang Guo (<a href="https://twitter.com/guoygang">@guoygang</a>) of 1265 IceSword Lab, Qihoo 360 Technology Co. Ltd</td> 1266 </tr> 1267 <tr> 1268 <td>CVE-2017-0651</td> 1269 <td>Yuan-Tsung Lo (<a 1270 href="mailto:computernik (a] gmail.com">computernik (a] gmail.com</a>) and Xuxian Jiang 1271 of <a href="http://c0reteam.org">C0RE Team</a></td> 1272 </tr> 1273 <tr> 1274 <td>CVE-2017-8241</td> 1275 <td>Zubin Mithra of Google</td> 1276 </tr> 1277 </table> 1278 <h2 id="common-questions-and-answers">Common questions and answers</h2> 1279 <p>This section answers common questions that may occur after reading this 1280 bulletin.</p> 1281 1282 <p><strong>1. How do I determine if my device is updated to address these issues? 1283 </strong></p> 1284 1285 <p>To learn how to check a device's security patch level, read the instructions on 1286 the <a 1287 href="https://support.google.com/pixelphone/answer/4457705#pixel_phones&nexus_devices">Pixel 1288 and Nexus update schedule</a>.</p> 1289 <ul> 1290 <li>Security patch levels of 2017-06-01 or later address all issues associated 1291 with the 2017-06-01 security patch level.</li> 1292 <li>Security patch levels of 2017-06-05 or later address all issues associated 1293 with the 2017-06-05 security patch level and all previous patch levels.</li></ul> 1294 <p>Device manufacturers that include these updates should set the patch string 1295 level to:</p> 1296 <ul> 1297 <li>[ro.build.version.security_patch]:[2017-06-01]</li> 1298 <li>[ro.build.version.security_patch]:[2017-06-05]</li></ul> 1299 <p><strong>2. Why does this bulletin have two security patch levels?</strong></p> 1300 1301 <p>This bulletin has two security patch levels so that Android partners have the 1302 flexibility to fix a subset of vulnerabilities that are similar across all 1303 Android devices more quickly. Android partners are encouraged to fix all issues 1304 in this bulletin and use the latest security patch level.</p> 1305 <ul> 1306 <li>Devices that use the June 01, 2017 security patch level must include all 1307 issues associated with that security patch level, as well as fixes for all 1308 issues reported in previous security bulletins.</li> 1309 <li>Devices that use the security patch level of June 05, 2017 or newer must 1310 include all applicable patches in this (and previous) security 1311 bulletins.</li></ul> 1312 <p>Partners are encouraged to bundle the fixes for all issues they are addressing 1313 in a single update.</p> 1314 1315 <p id="vulnerability-type"><strong>3. What do the entries in the <em>Type</em> column mean?</strong></p> 1316 1317 <p>Entries in the <em>Type</em> column of the vulnerability details table reference 1318 the classification of the security vulnerability.</p> 1319 1320 <table> 1321 <col width="25%"> 1322 <col width="75%"> 1323 <tr> 1324 <th>Abbreviation</th> 1325 <th>Definition</th> 1326 </tr> 1327 <tr> 1328 <td>RCE</td> 1329 <td>Remote code execution</td> 1330 </tr> 1331 <tr> 1332 <td>EoP</td> 1333 <td>Elevation of privilege</td> 1334 </tr> 1335 <tr> 1336 <td>ID</td> 1337 <td>Information disclosure</td> 1338 </tr> 1339 <tr> 1340 <td>DoS</td> 1341 <td>Denial of service</td> 1342 </tr> 1343 <tr> 1344 <td>N/A</td> 1345 <td>Classification not available</td> 1346 </tr> 1347 </table> 1348 <p><strong>4. What do the entries in the <em>References</em> column mean?</strong></p> 1349 1350 <p>Entries under the <em>References</em> column of the vulnerability details table 1351 may contain a prefix identifying the organization to which the reference value 1352 belongs.</p> 1353 1354 <table> 1355 <col width="25%"> 1356 <col width="75%"> 1357 <tr> 1358 <th>Prefix</th> 1359 <th>Reference</th> 1360 </tr> 1361 <tr> 1362 <td>A-</td> 1363 <td>Android bug ID</td> 1364 </tr> 1365 <tr> 1366 <td>QC-</td> 1367 <td>Qualcomm reference number</td> 1368 </tr> 1369 <tr> 1370 <td>M-</td> 1371 <td>MediaTek reference number</td> 1372 </tr> 1373 <tr> 1374 <td>N-</td> 1375 <td>NVIDIA reference number</td> 1376 </tr> 1377 <tr> 1378 <td>B-</td> 1379 <td>Broadcom reference number</td> 1380 </tr> 1381 </table> 1382 <p id="asterisk"><strong>5. What does a <a href="#asterisk">*</a> next to the Android bug ID in the <em>References</em> 1383 column mean?</strong></p> 1384 1385 <p>Issues that are not publicly available have a <a href="#asterisk">*</a> next to the Android bug ID in 1386 the <em>References</em> column. The update for that issue is generally contained 1387 in the latest binary drivers for Nexus devices available from the <a 1388 href="https://developers.google.com/android/nexus/drivers">Google Developer 1389 site</a>.</p> 1390 1391 <h2 id="versions">Versions</h2> 1392 <table> 1393 <col width="25%"> 1394 <col width="25%"> 1395 <col width="50%"> 1396 <tr> 1397 <th>Version</th> 1398 <th>Date</th> 1399 <th>Notes</th> 1400 </tr> 1401 <tr> 1402 <td>1.0</td> 1403 <td>June 5, 2017</td> 1404 <td>Bulletin published.</td> 1405 </tr> 1406 <tr> 1407 <td>1.1</td> 1408 <td>June 7, 2017</td> 1409 <td>Bulletin revised to include AOSP links.</td> 1410 </tr> 1411 <tr> 1412 <td>1.2</td> 1413 <td>July 11, 2017</td> 1414 <td>Bulletin revised to include CVE-2017-6249.</td> 1415 </tr> 1416 </table> 1417 </body> 1418 </html> 1419