Home | History | Annotate | Download | only in bulletin
      1 <html devsite>
      2   <head>
      3     <title>Nexus  - 2015  8 </title>
      4     <meta name="project_path" value="/_project.yaml" />
      5     <meta name="book_path" value="/_book.yaml" />
      6   </head>
      7   <body>
      8   <!--
      9       Copyright 2017 The Android Open Source Project
     10 
     11       Licensed under the Apache License, Version 2.0 (the "License");
     12       you may not use this file except in compliance with the License.
     13       You may obtain a copy of the License at
     14 
     15           http://www.apache.org/licenses/LICENSE-2.0
     16 
     17       Unless required by applicable law or agreed to in writing, software
     18       distributed under the License is distributed on an "AS IS" BASIS,
     19       WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
     20       See the License for the specific language governing permissions and
     21       limitations under the License.
     22   -->
     23 
     24 
     25 
     26 <div id="jd-content">
     27  <div class="jd-descr" itemprop="articleBody">
     28   <!--
     29     Copyright 2015 The Android Open Source Project
     30 
     31     Licensed under the Apache License, Version 2.0 (the "License");
     32     you may not use this file except in compliance with the License.
     33     You may obtain a copy of the License at
     34 
     35         http://www.apache.org/licenses/LICENSE-2.0
     36 
     37     Unless required by applicable law or agreed to in writing, software
     38     distributed under the License is distributed on an "AS IS" BASIS,
     39     WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
     40     See the License for the specific language governing permissions and
     41     limitations under the License.
     42 -->
     43   <p>
     44    <em>
     45     2015  8  13 
     46    </em>
     47   </p>
     48   <p>
     49     Android  (OTA)  Nexus 
     50    <a href="https://developers.google.com/android/nexus/images">
     51     Google Developers 
     52    </a>
     53     Nexus LMY48I  2015  6  25 
     54   </p>
     55   <p>
     56    
     57   </p>
     58   <h2 id="security_vulnerability_summary" style="margin-bottom:0px">
     59    
     60   </h2>
     61   <hr/>
     62   <p>
     63     CVE
     64    <a href="http://source.android.com/security/overview/updates-resources.html#severity">
     65     
     66    </a>
     67    
     68   </p>
     69   <table>
     70    <tbody>
     71     <tr>
     72      <th>
     73       
     74      </th>
     75      <th>
     76       CVE
     77      </th>
     78      <th>
     79       
     80      </th>
     81     </tr>
     82     <tr>
     83      <td>
     84        MP4 atom 
     85      </td>
     86      <td>
     87       CVE-2015-1538
     88      </td>
     89      <td>
     90       
     91      </td>
     92     </tr>
     93     <tr>
     94      <td>
     95        ESDS 
     96      </td>
     97      <td>
     98       CVE-2015-1539
     99      </td>
    100      <td>
    101       
    102      </td>
    103     </tr>
    104     <tr>
    105      <td>
    106        MPEG4 tx3g atom libstagefright 
    107      </td>
    108      <td>
    109       CVE-2015-3824
    110      </td>
    111      <td>
    112       
    113      </td>
    114     </tr>
    115     <tr>
    116      <td>
    117        MPEG4 covr atom libstagefright 
    118      </td>
    119      <td>
    120       CVE-2015-3827
    121      </td>
    122      <td>
    123       
    124      </td>
    125     </tr>
    126     <tr>
    127      <td>
    128        3GPP  6 libstagefright 
    129      </td>
    130      <td>
    131       CVE-2015-3828
    132      </td>
    133      <td>
    134       
    135      </td>
    136     </tr>
    137     <tr>
    138      <td>
    139        MPEG4 covr atom  chunk_data_size  SIZE_MAX libstagefright 
    140      </td>
    141      <td>
    142       CVE-2015-3829
    143      </td>
    144      <td>
    145       
    146      </td>
    147     </tr>
    148     <tr>
    149      <td>
    150       Sonivox Parse_wave 
    151      </td>
    152      <td>
    153       CVE-2015-3836
    154      </td>
    155      <td>
    156       
    157      </td>
    158     </tr>
    159     <tr>
    160      <td>
    161       libstagefright MPEG4Extractor.cpp 
    162      </td>
    163      <td>
    164       CVE-2015-3832
    165      </td>
    166      <td>
    167       
    168      </td>
    169     </tr>
    170     <tr>
    171      <td>
    172       mediaserver BpMediaHTTPConnection 
    173      </td>
    174      <td>
    175       CVE-2015-3831
    176      </td>
    177      <td>
    178       
    179      </td>
    180     </tr>
    181     <tr>
    182      <td>
    183       libpng png_Read_IDAT_data 
    184      </td>
    185      <td>
    186       CVE-2015-0973
    187      </td>
    188      <td>
    189       
    190      </td>
    191     </tr>
    192     <tr>
    193      <td>
    194       wpa_supplicant  p2p_add_device()  memcpy() 
    195      </td>
    196      <td>
    197       CVE-2015-1863
    198      </td>
    199      <td>
    200       
    201      </td>
    202     </tr>
    203     <tr>
    204      <td>
    205       OpenSSLX509Certificate 
    206      </td>
    207      <td>
    208       CVE-2015-3837
    209      </td>
    210      <td>
    211       
    212      </td>
    213     </tr>
    214     <tr>
    215      <td>
    216       mediaserver BnHDCP 
    217      </td>
    218      <td>
    219       CVE-2015-3834
    220      </td>
    221      <td>
    222       
    223      </td>
    224     </tr>
    225     <tr>
    226      <td>
    227       libstagefright OMXNodeInstance::emptyBuffer 
    228      </td>
    229      <td>
    230       CVE-2015-3835
    231      </td>
    232      <td>
    233       
    234      </td>
    235     </tr>
    236     <tr>
    237      <td>
    238       mediaserver AudioPolicyManager::getInputForAttr() 
    239      </td>
    240      <td>
    241       CVE-2015-3842
    242      </td>
    243      <td>
    244       
    245      </td>
    246     </tr>
    247     <tr>
    248      <td>
    249        Telephony  SIM 
    250      </td>
    251      <td>
    252       CVE-2015-3843
    253      </td>
    254      <td>
    255       
    256      </td>
    257     </tr>
    258     <tr>
    259      <td>
    260       
    261      </td>
    262      <td>
    263       CVE-2015-1536
    264      </td>
    265      <td>
    266       
    267      </td>
    268     </tr>
    269     <tr>
    270      <td>
    271       AppWidgetServiceImpl  IntentSender
    272      </td>
    273      <td>
    274       CVE-2015-1541
    275      </td>
    276      <td>
    277       
    278      </td>
    279     </tr>
    280     <tr>
    281      <td>
    282        getRecentTasks() 
    283      </td>
    284      <td>
    285       CVE-2015-3833
    286      </td>
    287      <td>
    288       
    289      </td>
    290     </tr>
    291     <tr>
    292      <td>
    293       ActivityManagerService.getProcessRecordLocked()  UID 
    294      </td>
    295      <td>
    296       CVE-2015-3844
    297      </td>
    298      <td>
    299       
    300      </td>
    301     </tr>
    302     <tr>
    303      <td>
    304        3GPP libstagefright 
    305      </td>
    306      <td>
    307       CVE-2015-3826
    308      </td>
    309      <td>
    310       
    311      </td>
    312     </tr>
    313    </tbody>
    314   </table>
    315   <h2 id="mitigations" style="margin-bottom:0px">
    316    
    317   </h2>
    318   <hr/>
    319   <p>
    320    
    321    <a href="http://source.android.com/security/enhancements/index.html">
    322     Android 
    323    </a>
    324     SafetyNet Android 
    325   </p>
    326   <ul>
    327    <li>
    328      Android  Android  Android
    329    </li>
    330    <li>
    331     Android  SafetyNet Google Play  Root  Google Play  Root 
    332    </li>
    333    <li>
    334      Google  Messenger  mediaserver 
    335    </li>
    336   </ul>
    337   <h2 id="acknowledgements" style="margin-bottom:0px">
    338    
    339   </h2>
    340   <hr/>
    341   <p>
    342    
    343   </p>
    344   <ul>
    345    <li>
    346     Joshua DrakeCVE-2015-1538CVE-2015-3826
    347    </li>
    348    <li>
    349     Ben HawkesCVE-2015-3836
    350    </li>
    351    <li>
    352     Alexandru BlandaCVE-2015-3832
    353    </li>
    354    <li>
    355     Alexandru BlandaCVE-2015-3832
    356    </li>
    357    <li>
    358     Alex CopotCVE-2015-1536
    359    </li>
    360    <li>
    361     Alex EubanksCVE-2015-0973
    362    </li>
    363    <li>
    364     Roee Hay  Or PelesCVE-2015-3837
    365    </li>
    366    <li>
    367     CVE-2015-3834
    368    </li>
    369    <li>
    370     Gal BeniaminiCVE-2015-3835
    371    </li>
    372    <li>
    373     *CVE-2015-3842
    374    </li>
    375    <li>
    376     Artem ChaykinCVE-2015-3843
    377    </li>
    378   </ul>
    379   <p>
    380    *
    381    <a href="https://www.google.com/about/appsecurity/android-rewards/">
    382     Android 
    383    </a>
    384    
    385   </p>
    386   <h3 id="integer_overflows_during_mp4_atom_processing">
    387     MP4 atom 
    388   </h3>
    389   <p>
    390     MP4 atom libstagefright  mediaserver 
    391   </p>
    392   <p>
    393     API
    394   </p>
    395   <p>
    396     mediaserver  SELinux  2015  6 
    397   </p>
    398   <table>
    399    <tbody>
    400     <tr>
    401      <th>
    402       CVE
    403      </th>
    404      <th>
    405       Bug AOSP 
    406      </th>
    407      <th>
    408       
    409      </th>
    410      <th>
    411       
    412      </th>
    413     </tr>
    414     <tr>
    415      <td>
    416       CVE-2015-1538
    417      </td>
    418      <td>
    419       <a href="https://android.googlesource.com/platform/frameworks/av/+/cf1581c66c2ad8c5b1aaca2e43e350cf5974f46d">
    420        ANDROID-20139950
    421       </a>
    422       [
    423       <a href="https://android.googlesource.com/platform/frameworks/av/+/2434839bbd168469f80dd9a22f1328bc81046398">
    424        2
    425       </a>
    426       ]
    427      </td>
    428      <td>
    429       
    430      </td>
    431      <td>
    432       5.1 
    433      </td>
    434     </tr>
    435    </tbody>
    436   </table>
    437   <h3 id="an_integer_underflow_in_esds_processing">
    438     ESDS 
    439   </h3>
    440   <p>
    441     ESDS atom libstagefright  mediaserver 
    442   </p>
    443   <p>
    444     API
    445   </p>
    446   <p>
    447     mediaserver  SELinux  2015  6 
    448   </p>
    449   <table>
    450    <tbody>
    451     <tr>
    452      <th>
    453       CVE
    454      </th>
    455      <th>
    456       Bug AOSP 
    457      </th>
    458      <th>
    459       
    460      </th>
    461      <th>
    462       
    463      </th>
    464     </tr>
    465     <tr>
    466      <td>
    467       CVE-2015-1539
    468      </td>
    469      <td>
    470       <a href="https://android.googlesource.com/platform/frameworks/av/+/5e751957ba692658b7f67eb03ae5ddb2cd3d970c">
    471        ANDROID-20139950
    472       </a>
    473      </td>
    474      <td>
    475       
    476      </td>
    477      <td>
    478       5.1 
    479      </td>
    480     </tr>
    481    </tbody>
    482   </table>
    483   <h3 id="integer_overflow_in_libstagefright_when_parsing_the_mpeg4_tx3g_atom">
    484     MPEG4 tx3g atom libstagefright 
    485   </h3>
    486   <p>
    487     MPEG4 tx3g libstagefright  mediaserver 
    488   </p>
    489   <p>
    490     API
    491   </p>
    492   <p>
    493     mediaserver  SELinux 
    494   </p>
    495   <p>
    496     2015  6 
    497   </p>
    498   <table>
    499    <tbody>
    500     <tr>
    501      <th>
    502       CVE
    503      </th>
    504      <th>
    505       Bug AOSP 
    506      </th>
    507      <th>
    508       
    509      </th>
    510      <th>
    511       
    512      </th>
    513     </tr>
    514     <tr>
    515      <td>
    516       CVE-2015-3824
    517      </td>
    518      <td>
    519       <a href="https://android.googlesource.com/platform/frameworks/av/+/463a6f807e187828442949d1924e143cf07778c6">
    520        ANDROID-20923261
    521       </a>
    522      </td>
    523      <td>
    524       
    525      </td>
    526      <td>
    527       5.1 
    528      </td>
    529     </tr>
    530    </tbody>
    531   </table>
    532   <h3 id="integer_underflow_in_libstagefright_when_processing_mpeg4_covr_atoms">
    533     MPEG4 covr atom libstagefright 
    534   </h3>
    535   <p>
    536     MPEG4 libstagefright  mediaserver 
    537   </p>
    538   <p>
    539     API
    540   </p>
    541   <p>
    542     mediaserver  SELinux 
    543   </p>
    544   <p>
    545     2015  6 
    546   </p>
    547   <table>
    548    <tbody>
    549     <tr>
    550      <th>
    551       CVE
    552      </th>
    553      <th>
    554       Bug AOSP 
    555      </th>
    556      <th>
    557       
    558      </th>
    559      <th>
    560       
    561      </th>
    562     </tr>
    563     <tr>
    564      <td>
    565       CVE-2015-3827
    566      </td>
    567      <td>
    568       <a href="https://android.googlesource.com/platform/frameworks/av/+/f4a88c8ed4f8186b3d6e2852993e063fc33ff231">
    569        ANDROID-20923261
    570       </a>
    571      </td>
    572      <td>
    573       
    574      </td>
    575      <td>
    576       5.1 
    577      </td>
    578     </tr>
    579    </tbody>
    580   </table>
    581   <h3 id="integer_underflow_in_libstagefright_if_size_is_below_6_while_processing_3gpp_metadata">
    582     3GPP  6 libstagefright 
    583   </h3>
    584   <p>
    585     3GPP libstagefright  mediaserver 
    586   </p>
    587   <p>
    588     API
    589   </p>
    590   <p>
    591     mediaserver  SELinux  2015  6 
    592   </p>
    593   <table>
    594    <tbody>
    595     <tr>
    596      <th>
    597       CVE
    598      </th>
    599      <th>
    600       Bug AOSP 
    601      </th>
    602      <th>
    603       
    604      </th>
    605      <th>
    606       
    607      </th>
    608     </tr>
    609     <tr>
    610      <td>
    611       CVE-2015-3828
    612      </td>
    613      <td>
    614       <a href="https://android.googlesource.com/platform/frameworks/av/+/f4f7e0c102819f039ebb1972b3dba1d3186bc1d1">
    615        ANDROID-20923261
    616       </a>
    617      </td>
    618      <td>
    619       
    620      </td>
    621      <td>
    622       5.0 
    623      </td>
    624     </tr>
    625    </tbody>
    626   </table>
    627   <h3 id="integer_overflow_in_libstagefright_processing_mpeg4_covr_atoms_when_chunk_data_size_is_size_max">
    628     MPEG4 covr atom  chunk_data_size  SIZE_MAX libstagefright 
    629   </h3>
    630   <p>
    631     MPEG4 covr libstagefright  mediaserver 
    632   </p>
    633   <p>
    634     API
    635   </p>
    636   <p>
    637     mediaserver  SELinux  2015  6 
    638   </p>
    639   <table>
    640    <tbody>
    641     <tr>
    642      <th>
    643       CVE
    644      </th>
    645      <th>
    646       Bug AOSP 
    647      </th>
    648      <th>
    649       
    650      </th>
    651      <th>
    652       
    653      </th>
    654     </tr>
    655     <tr>
    656      <td>
    657       CVE-2015-3829
    658      </td>
    659      <td>
    660       <a href="https://android.googlesource.com/platform/frameworks/av/+/2674a7218eaa3c87f2ee26d26da5b9170e10f859">
    661        ANDROID-20923261
    662       </a>
    663      </td>
    664      <td>
    665       
    666      </td>
    667      <td>
    668       5.0 
    669      </td>
    670     </tr>
    671    </tbody>
    672   </table>
    673   <h3 id="buffer_overflow_in_sonivox_parse_wave">
    674    Sonivox Parse_wave 
    675   </h3>
    676   <p>
    677     XMF Sonivox  mediaserver 
    678   </p>
    679   <p>
    680     API
    681   </p>
    682   <p>
    683     mediaserver  SELinux  2015  6 
    684   </p>
    685   <table>
    686    <tbody>
    687     <tr>
    688      <th>
    689       CVE
    690      </th>
    691      <th>
    692       Bug AOSP 
    693      </th>
    694      <th>
    695       
    696      </th>
    697      <th>
    698       
    699      </th>
    700     </tr>
    701     <tr>
    702      <td>
    703       CVE-2015-3836
    704      </td>
    705      <td>
    706       <a href="https://android.googlesource.com/platform/external/sonivox/+/e999f077f6ef59d20282f1e04786816a31fb8be6">
    707        ANDROID-21132860
    708       </a>
    709      </td>
    710      <td>
    711       
    712      </td>
    713      <td>
    714       5.1 
    715      </td>
    716     </tr>
    717    </tbody>
    718   </table>
    719   <h3 id="buffer_overflows_in_libstagefright_mpeg4extractor_cpp">
    720    libstagefright MPEG4Extractor.cpp 
    721   </h3>
    722   <p>
    723     MP4 libstagefright  mediaserver 
    724   </p>
    725   <p>
    726     API
    727   </p>
    728   <p>
    729     mediaserver  SELinux 
    730   </p>
    731   <p>
    732     2015  6 
    733   </p>
    734   <table>
    735    <tbody>
    736     <tr>
    737      <th>
    738       CVE
    739      </th>
    740      <th>
    741       Bug AOSP 
    742      </th>
    743      <th>
    744       
    745      </th>
    746      <th>
    747       
    748      </th>
    749     </tr>
    750     <tr>
    751      <td>
    752       CVE-2015-3832
    753      </td>
    754      <td>
    755       <a href="https://android.googlesource.com/platform/frameworks/av/+/d48f0f145f8f0f4472bc0af668ac9a8bce44ba9b">
    756        ANDROID-19641538
    757       </a>
    758      </td>
    759      <td>
    760       
    761      </td>
    762      <td>
    763       5.1 
    764      </td>
    765     </tr>
    766    </tbody>
    767   </table>
    768   <h3 id="buffer_overflow_in_mediaserver_bpmediahttpconnection">
    769    mediaserver BpMediaHTTPConnection 
    770   </h3>
    771   <p>
    772    BpMediaHTTPConnection  mediaserver 
    773   </p>
    774   <p>
    775     API
    776   </p>
    777   <p>
    778     mediaserver  mediaserver  SELinux 
    779   </p>
    780   <table>
    781    <tbody>
    782     <tr>
    783      <th>
    784       CVE
    785      </th>
    786      <th>
    787       Bug AOSP 
    788      </th>
    789      <th>
    790       
    791      </th>
    792      <th>
    793       
    794      </th>
    795     </tr>
    796     <tr>
    797      <td>
    798       CVE-2015-3831
    799      </td>
    800      <td>
    801       <a href="https://android.googlesource.com/platform/frameworks/av/+/51504928746edff6c94a1c498cf99c0a83bedaed">
    802        ANDROID-19400722
    803       </a>
    804      </td>
    805      <td>
    806       
    807      </td>
    808      <td>
    809       5.0  5.1
    810      </td>
    811     </tr>
    812    </tbody>
    813   </table>
    814   <h3 id="vulnerability_in_libpng_overflow_in_png_read_idat_data">
    815    libpng png_Read_IDAT_data 
    816   </h3>
    817   <p>
    818     libpng  png_read_IDAT_data()  IDAT 
    819   </p>
    820   <p>
    821     API
    822   </p>
    823   <p>
    824    
    825   </p>
    826   <table>
    827    <tbody>
    828     <tr>
    829      <th>
    830       CVE
    831      </th>
    832      <th>
    833       Bug AOSP 
    834      </th>
    835      <th>
    836       
    837      </th>
    838      <th>
    839       
    840      </th>
    841     </tr>
    842     <tr>
    843      <td>
    844       CVE-2015-0973
    845      </td>
    846      <td>
    847       <a href="https://android.googlesource.com/platform/external/libpng/+/dd0ed46397a05ae69dc8c401f5711f0db0a964fa">
    848        ANDROID-19499430
    849       </a>
    850      </td>
    851      <td>
    852       
    853      </td>
    854      <td>
    855       5.1 
    856      </td>
    857     </tr>
    858    </tbody>
    859   </table>
    860   <h3 id="remotely_exploitable_memcpy_overflow_in_p2p_add_device_in_wpa_supplicant">
    861    wpa_supplicant  p2p_add_device()  memcpy() 
    862   </h3>
    863   <p>
    864     wpa_supplicant  WLAN Direct  p2p_add_device()  Android WLAN
    865   </p>
    866   <p>
    867    
    868   </p>
    869   <p>
    870    - WLAN Direct  Android 
    871   </p>
    872   <p>
    873    -  WLAN 
    874   </p>
    875   <p>
    876    - wpa_supplicant WLAN
    877   </p>
    878   <p>
    879    - Android 4.1  ASLR 
    880   </p>
    881   <p>
    882    - wpa_supplicant  Android 5.0  SELinux 
    883   </p>
    884   <p>
    885    WLAN
    886   </p>
    887   <table>
    888    <tbody>
    889     <tr>
    890      <th>
    891       CVE
    892      </th>
    893      <th>
    894       Bug AOSP 
    895      </th>
    896      <th>
    897       
    898      </th>
    899      <th>
    900       
    901      </th>
    902     </tr>
    903     <tr>
    904      <td>
    905       CVE-2015-1863
    906      </td>
    907      <td>
    908       <a href="https://android.googlesource.com/platform/external/wpa_supplicant_8/+/4cf0f2d0d869c35a9ec4432861d5efa8ead4279c">
    909        ANDROID-20076874
    910       </a>
    911      </td>
    912      <td>
    913       
    914      </td>
    915      <td>
    916       5.1 
    917      </td>
    918     </tr>
    919    </tbody>
    920   </table>
    921   <h3 id="memory_corruption_in_opensslx509certificate_deserialization">
    922    OpenSSLX509Certificate 
    923   </h3>
    924   <p>
    925     Intent Intent 
    926   </p>
    927   <p>
    928    
    929   </p>
    930   <table>
    931    <tbody>
    932     <tr>
    933      <th>
    934       CVE
    935      </th>
    936      <th>
    937       Bug AOSP 
    938      </th>
    939      <th>
    940       
    941      </th>
    942      <th>
    943       
    944      </th>
    945     </tr>
    946     <tr>
    947      <td>
    948       CVE-2015-3837
    949      </td>
    950      <td>
    951       <a href="https://android.googlesource.com/platform/external/conscrypt/+/edf7055461e2d7fa18de5196dca80896a56e3540">
    952        ANDROID-21437603
    953       </a>
    954      </td>
    955      <td>
    956       
    957      </td>
    958      <td>
    959       5.1 
    960      </td>
    961     </tr>
    962    </tbody>
    963   </table>
    964   <h3 id="buffer_overflow_in_mediaserver_bnhdcp">
    965    mediaserver BnHDCP 
    966   </h3>
    967   <p>
    968    libstagefright  mediaserver 
    969   </p>
    970   <p>
    971     mediaserver  SELinux 
    972   </p>
    973   <p>
    974     2015  6 
    975   </p>
    976   <table>
    977    <tbody>
    978     <tr>
    979      <th>
    980       CVE
    981      </th>
    982      <th>
    983       Bug AOSP 
    984      </th>
    985      <th>
    986       
    987      </th>
    988      <th>
    989       
    990      </th>
    991     </tr>
    992     <tr>
    993      <td>
    994       CVE-2015-3834
    995      </td>
    996      <td>
    997       <a href="https://android.googlesource.com/platform/frameworks/av/+/c82e31a7039a03dca7b37c65b7890ba5c1e18ced">
    998        ANDROID-20222489
    999       </a>
   1000      </td>
   1001      <td>
   1002       
   1003      </td>
   1004      <td>
   1005       5.1 
   1006      </td>
   1007     </tr>
   1008    </tbody>
   1009   </table>
   1010   <h3 id="buffer_overflow_in_libstagefright_omxnodeinstance_emptybuffer">
   1011    libstagefright OMXNodeInstance::emptyBuffer 
   1012   </h3>
   1013   <p>
   1014    libstagefright  mediaserver 
   1015   </p>
   1016   <p>
   1017     mediaserver  SELinux 
   1018   </p>
   1019   <p>
   1020     2015  6 
   1021   </p>
   1022   <table>
   1023    <tbody>
   1024     <tr>
   1025      <th>
   1026       CVE
   1027      </th>
   1028      <th>
   1029       Bug AOSP 
   1030      </th>
   1031      <th>
   1032       
   1033      </th>
   1034      <th>
   1035       
   1036      </th>
   1037     </tr>
   1038     <tr>
   1039      <td>
   1040       CVE-2015-3835
   1041      </td>
   1042      <td>
   1043       <a href="https://android.googlesource.com/platform/frameworks/av/+/086d84f45ab7b64d1a7ed7ac8ba5833664a6a5ab">
   1044        ANDROID-20634516
   1045       </a>
   1046       [
   1047       <a href="https://android.googlesource.com/platform/frameworks/av/+/3cb1b6944e776863aea316e25fdc16d7f9962902">
   1048        2
   1049       </a>
   1050       ]
   1051      </td>
   1052      <td>
   1053       
   1054      </td>
   1055      <td>
   1056       5.1 
   1057      </td>
   1058     </tr>
   1059    </tbody>
   1060   </table>
   1061   <h3 id="heap_overflow_in_mediaserver_audiopolicymanager_getinputforattr">
   1062    mediaserver AudioPolicyManager::getInputForAttr() 
   1063   </h3>
   1064   <p>
   1065    mediaserver  mediaserver 
   1066   </p>
   1067   <p>
   1068     API
   1069   </p>
   1070   <p>
   1071     mediaserver  mediaserver  SELinux 
   1072   </p>
   1073   <table>
   1074    <tbody>
   1075     <tr>
   1076      <th>
   1077       CVE
   1078      </th>
   1079      <th>
   1080       Bug AOSP 
   1081      </th>
   1082      <th>
   1083       
   1084      </th>
   1085      <th>
   1086       
   1087      </th>
   1088     </tr>
   1089     <tr>
   1090      <td>
   1091       CVE-2015-3842
   1092      </td>
   1093      <td>
   1094       <a href="https://android.googlesource.com/platform/frameworks/av/+/aeea52da00d210587fb3ed895de3d5f2e0264c88">
   1095        ANDROID-21953516
   1096       </a>
   1097      </td>
   1098      <td>
   1099       
   1100      </td>
   1101      <td>
   1102       5.1 
   1103      </td>
   1104     </tr>
   1105    </tbody>
   1106   </table>
   1107   <h3 id="applications_can_intercept_or_emulate_sim_commands_to_telephony">
   1108     Telephony  SIM 
   1109   </h3>
   1110   <p>
   1111    SIM  (STK)  Android  Telephony  STK SIM 
   1112   </p>
   1113   <p>
   1114    
   1115   </p>
   1116   <table>
   1117    <tbody>
   1118     <tr>
   1119      <th>
   1120       CVE
   1121      </th>
   1122      <th>
   1123       Bug AOSP 
   1124      </th>
   1125      <th>
   1126       
   1127      </th>
   1128      <th>
   1129       
   1130      </th>
   1131     </tr>
   1132     <tr>
   1133      <td>
   1134       CVE-2015-3843
   1135      </td>
   1136      <td>
   1137       <a href="https://android.googlesource.com/platform/frameworks/opt/telephony/+/b48581401259439dc5ef6dcf8b0f303e4cbefbe9">
   1138        ANDROID-21697171
   1139       </a>
   1140       [
   1141       <a href="https://android.googlesource.com/platform/packages/apps/Stk/+/1d8e00160c07ae308e5b460214eb2a425b93ccf7">
   1142        2
   1143       </a>
   1144       
   1145       <a href="https://android.googlesource.com/platform/frameworks/base/+/a5e904e7eb3aaec532de83ca52e24af18e0496b4">
   1146        3
   1147       </a>
   1148       
   1149       <a href="https://android.googlesource.com/platform/packages/services/Telephony/+/fcb1d13c320dd1a6350bc7af3166929b4d54a456">
   1150        4
   1151       </a>
   1152       ]
   1153      </td>
   1154      <td>
   1155       
   1156      </td>
   1157      <td>
   1158       5.1 
   1159      </td>
   1160     </tr>
   1161    </tbody>
   1162   </table>
   1163   <h3 id="vulnerability_in_bitmap_unmarshalling">
   1164    
   1165   </h3>
   1166   <p>
   1167    Bitmap_createFromParcel  system_server  system_server 
   1168   </p>
   1169   <p>
   1170     system_server 
   1171   </p>
   1172   <table>
   1173    <tbody>
   1174     <tr>
   1175      <th>
   1176       CVE
   1177      </th>
   1178      <th>
   1179       Bug AOSP 
   1180      </th>
   1181      <th>
   1182       
   1183      </th>
   1184      <th>
   1185       
   1186      </th>
   1187     </tr>
   1188     <tr>
   1189      <td>
   1190       CVE-2015-1536
   1191      </td>
   1192      <td>
   1193       <a href="https://android.googlesource.com/platform/frameworks/base/+/d44e5bde18a41beda39d49189bef7f2ba7c8f3cb">
   1194        ANDROID-19666945
   1195       </a>
   1196      </td>
   1197      <td>
   1198       
   1199      </td>
   1200      <td>
   1201       5.1 
   1202      </td>
   1203     </tr>
   1204    </tbody>
   1205   </table>
   1206   <h3 id="appwidgetserviceimpl_can_create_intentsender_with_system_privileges">
   1207    AppWidgetServiceImpl  IntentSender
   1208   </h3>
   1209   <p>
   1210     AppWidgetServiceImpl  FLAG_GRANT_READ/WRITE_URI_PERMISSION  URI  READ_CONTACTS 
   1211   </p>
   1212   <p>
   1213    
   1214   </p>
   1215   <table>
   1216    <tbody>
   1217     <tr>
   1218      <th>
   1219       CVE
   1220      </th>
   1221      <th>
   1222       Bug AOSP 
   1223      </th>
   1224      <th>
   1225       
   1226      </th>
   1227      <th>
   1228       
   1229      </th>
   1230     </tr>
   1231     <tr>
   1232      <td>
   1233       CVE-2015-1541
   1234      </td>
   1235      <td>
   1236       <a href="https://android.googlesource.com/platform/frameworks/base/+/0b98d304c467184602b4c6bce76fda0b0274bc07">
   1237        ANDROID-19618745
   1238       </a>
   1239      </td>
   1240      <td>
   1241       
   1242      </td>
   1243      <td>
   1244       5.1
   1245      </td>
   1246     </tr>
   1247    </tbody>
   1248   </table>
   1249   <h3 id="mitigation_bypass_of_restrictions_on_getrecenttasks">
   1250     getRecentTasks() 
   1251   </h3>
   1252   <p>
   1253     Android 5.0  getRecentTasks() 
   1254   </p>
   1255   <p>
   1256    
   1257   </p>
   1258   <p>
   1259    
   1260    <a href="http://stackoverflow.com/questions/24625936/getrunningtasks-doesnt-work-in-android-l">
   1261     http://stackoverflow.com/questions/24625936/getrunningtasks-doesnt-work-in-android-l
   1262    </a>
   1263   </p>
   1264   <table>
   1265    <tbody>
   1266     <tr>
   1267      <th>
   1268       CVE
   1269      </th>
   1270      <th>
   1271       Bug AOSP 
   1272      </th>
   1273      <th>
   1274       
   1275      </th>
   1276      <th>
   1277       
   1278      </th>
   1279     </tr>
   1280     <tr>
   1281      <td>
   1282       CVE-2015-3833
   1283      </td>
   1284      <td>
   1285       <a href="https://android.googlesource.com/platform/frameworks/base/+/aaa0fee0d7a8da347a0c47cef5249c70efee209e">
   1286        ANDROID-20034603
   1287       </a>
   1288      </td>
   1289      <td>
   1290       
   1291      </td>
   1292      <td>
   1293       5.0  5.1
   1294      </td>
   1295     </tr>
   1296    </tbody>
   1297   </table>
   1298   <h3 id="activitymanagerservice_getprocessrecordlocked_may_load_a_system_uid_application_into_the_wrong_process">
   1299    ActivityManagerService.getProcessRecordLocked()  UID 
   1300   </h3>
   1301   <p>
   1302    ActivityManager  getProcessRecordLocked()  ActivityManager 
   1303   </p>
   1304   <p>
   1305    
   1306   </p>
   1307   <p>
   1308    
   1309   </p>
   1310   <table>
   1311    <tbody>
   1312     <tr>
   1313      <th>
   1314       CVE
   1315      </th>
   1316      <th>
   1317       Bug AOSP 
   1318      </th>
   1319      <th>
   1320       
   1321      </th>
   1322      <th>
   1323       
   1324      </th>
   1325     </tr>
   1326     <tr>
   1327      <td>
   1328       CVE-2015-3844
   1329      </td>
   1330      <td>
   1331       <a href="https://android.googlesource.com/platform/frameworks/base/+/e3cde784e3d99966f313fe00dcecf191f6a44a31">
   1332        ANDROID-21669445
   1333       </a>
   1334      </td>
   1335      <td>
   1336       
   1337      </td>
   1338      <td>
   1339       5.1 
   1340      </td>
   1341     </tr>
   1342    </tbody>
   1343   </table>
   1344   <h3 id="unbounded_buffer_read_in_libstagefright_while_parsing_3gpp_metadata">
   1345     3GPP libstagefright 
   1346   </h3>
   1347   <p>
   1348     3GPP  mediaserver 
   1349   </p>
   1350   <p>
   1351     mediaserver 
   1352   </p>
   1353   <table>
   1354    <tbody>
   1355     <tr>
   1356      <th>
   1357       CVE
   1358      </th>
   1359      <th>
   1360       Bug AOSP 
   1361      </th>
   1362      <th>
   1363       
   1364      </th>
   1365      <th>
   1366       
   1367      </th>
   1368     </tr>
   1369     <tr>
   1370      <td>
   1371       CVE-2015-3826
   1372      </td>
   1373      <td>
   1374       <a href="https://android.googlesource.com/platform/frameworks/av/+/f4f7e0c102819f039ebb1972b3dba1d3186bc1d1">
   1375        ANDROID-20923261
   1376       </a>
   1377      </td>
   1378      <td>
   1379       
   1380      </td>
   1381      <td>
   1382       5.0  5.1
   1383      </td>
   1384     </tr>
   1385    </tbody>
   1386   </table>
   1387   <h2 id="revisions" style="margin-bottom:0px">
   1388    
   1389   </h2>
   1390   <hr/>
   1391   <ul>
   1392    <li>
   1393     2015  8  13 
   1394    </li>
   1395   </ul>
   1396  </div>
   1397  <div class="content-footer-sac" itemscope="" itemtype="http://schema.org/SiteNavigationElement">
   1398   <div class="layout-content-col col-9" style="padding-top:4px">
   1399   </div>
   1400   <div class="paging-links layout-content-col col-4">
   1401   </div>
   1402  </div>
   1403 </div>
   1404 
   1405   </body>
   1406 </html>
   1407