From 3ef1ef078ef07fcae765883a088e162e359bf9ad Mon Sep 17 00:00:00 2001
From: Danielle Roberts Published January 03, 2017 Published January 03, 2017 | Updated January 04, 2017 The Android Security Bulletin contains details of security vulnerabilities
affecting Android devices. Alongside the bulletin, we have released a security
@@ -30,10 +30,9 @@ and Nexus update schedule to learn how to check a device's security patch
level. Partners were notified of the issues described in the bulletin on December 05,
-2016 or earlier. Source code patches for these issues will be released to the
-Android Open Source Project (AOSP) repository in the next 48 hours. We will
-revise this bulletin with the AOSP links when they are available. This bulletin
-also includes links to patches outside of AOSP.
The most severe of these issues is a Critical security vulnerability that could enable remote code execution on an affected device through multiple methods such @@ -586,7 +585,8 @@ remote code execution within the context of the Mediaserver process.
A remote code execution vulnerability in c-ares could enable an attacker using -a specially crafted request to execute arbitrary code in the context of a -privileged process. This issue is rated as Critical due to the possibility of -remote code execution in applications that use this library. +a specially crafted request to execute arbitrary code in the context of an +unprivileged process. This issue is rated as High due to the possibility of +remote code execution in an application that uses this library.
CVE-2016-5180 | -A-32205736 | ++ A-32205736 | High | All | 7.0 | @@ -629,8 +630,8 @@ remote code execution in applications that use this library.
A remote code execution vulnerability in the Framesequence library could enable an attacker using a specially crafted file to execute arbitrary code in the @@ -638,7 +639,6 @@ context of an unprivileged process. This issue is rated as High due to the possibility of remote code execution in an application that uses the Framesequence library.
-CVE | -References | -Severity | -Updated Google devices | -Updated AOSP versions | -Date reported | +CVE | +References | +Severity | +Updated Google devices | +Updated AOSP versions | +Date reported |
---|---|---|---|---|---|---|---|---|---|---|---|
CVE-2017-0382 | -A-32338390 | -High | -All | -5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1 | -Oct 21, 2016 | +CVE-2017-0382 | ++ A-32338390 | +High | +All | +5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1 | +Oct 21, 2016 |
An elevation of privilege vulnerability in the Framework APIs could enable a local malicious application to execute arbitrary code within the context of a -privileged process. This issue is rated as High because it could be used to -gain local access to elevated capabilities, which are not normally accessible -to a third-party application. +privileged process. This issue is rated as High because it could be used to gain +local access to elevated capabilities, which are not normally accessible to a +third-party application.
-CVE | -References | -Severity | -Updated Google devices | -Updated AOSP versions | -Date reported | +CVE | +References | +Severity | +Updated Google devices | +Updated AOSP versions | +Date reported |
---|---|---|---|---|---|---|---|---|---|---|---|
CVE-2017-0383 | -A-31677614 | -High | -All | -7.0, 7.1 | -Sep 21, 2016 | +CVE-2017-0383 | ++ A-31677614 | +High | +All | +7.0, 7.1 | +Sep 21, 2016 |
An elevation of privilege vulnerability in Audioserver could enable a local malicious application to execute arbitrary code within the context of a -privileged process. This issue is rated as High because it could be used to -gain local access to elevated capabilities, which are not normally accessible -to a third-party application. +privileged process. This issue is rated as High because it could be used to gain +local access to elevated capabilities, which are not normally accessible to a +third-party application.
-CVE | -References | -Severity | -Updated Google devices | -Updated AOSP versions | -Date reported | +CVE | +References | +Severity | +Updated Google devices | +Updated AOSP versions | +Date reported |
---|---|---|---|---|---|---|---|---|---|---|---|
CVE-2017-0384 | -A-32095626 | -High | -All | -4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1 | -Oct 11, 2016 | +CVE-2017-0384 | ++ A-32095626 | +High | +All | +4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1 | +Oct 11, 2016 |
CVE-2017-0385 | -A-32585400 | -High | -All | -4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1 | -Oct 11, 2016 | +CVE-2017-0385 | ++ A-32585400 | +High | +All | +4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1 | +Oct 11, 2016 |
An elevation of privilege vulnerability in the libnl library could enable a local malicious application to execute arbitrary code within the context of a -privileged process. This issue is rated as High because it could be used to -gain local access to elevated capabilities, which are not normally accessible -to a third-party application. +privileged process. This issue is rated as High because it could be used to gain +local access to elevated capabilities, which are not normally accessible to a +third-party application.
-CVE | -References | -Severity | -Updated Google devices | -Updated AOSP versions | -Date reported | +CVE | +References | +Severity | +Updated Google devices | +Updated AOSP versions | +Date reported |
---|---|---|---|---|---|---|---|---|---|---|---|
CVE-2017-0386 | -A-32255299 | -High | -All | -5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1 | -Oct 18, 2016 | +CVE-2017-0386 | ++ A-32255299 | +High | +All | +5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1 | +Oct 18, 2016 |
An elevation of privilege vulnerability in Mediaserver could enable a local malicious application to execute arbitrary code within the context of a -privileged process. This issue is rated as High because it could be used to -gain local access to elevated capabilities, which are not normally accessible -to a third-party application. +privileged process. This issue is rated as High because it could be used to gain +local access to elevated capabilities, which are not normally accessible to a +third-party application.
-CVE | -References | -Severity | -Updated Google devices | -Updated AOSP versions | -Date reported | +CVE | +References | +Severity | +Updated Google devices | +Updated AOSP versions | +Date reported |
---|---|---|---|---|---|---|---|---|---|---|---|
CVE-2017-0387 | -A-32660278 | -High | -All | -5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1 | -Nov 4, 2016 | +CVE-2017-0387 | ++ A-32660278 | +High | +All | +5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1 | +Nov 4, 2016 |
@@ -824,7 +817,6 @@ enable a local secondary user to read data from an external storage SD card inserted by the primary user. This issue is rated as High because it could be used to access data without permission.
-CVE | -References | -Severity | -Updated Google devices | -Updated AOSP versions | -Date reported | +CVE | +References | +Severity | +Updated Google devices | +Updated AOSP versions | +Date reported |
---|---|---|---|---|---|---|---|---|---|---|---|
CVE-2017-0388 | -A-32523490 | -High | -All | -6.0, 6.0.1, 7.0, 7.1 | -Google internal | +CVE-2017-0388 | ++ A-32523490 | +High | +All | +6.0, 6.0.1, 7.0, 7.1 | +Google internal |
A denial of service vulnerability in core networking could enable a remote attacker to use specially crafted network packet to cause a device hang or reboot. This issue is rated as High due to the possibility of remote denial of service.
-CVE | -References | -Severity | -Updated Google devices | -Updated AOSP versions | -Date reported | +CVE | +References | +Severity | +Updated Google devices | +Updated AOSP versions | +Date reported |
---|---|---|---|---|---|---|---|---|---|---|---|
CVE-2017-0389 | -A-31850211 | -High | -All | -6.0, 6.0.1, 7.0, 7.1 | -Jul 20, 2016 | +CVE-2017-0389 | ++ A-31850211 +[2] | +High | +All | +6.0, 6.0.1, 7.0, 7.1 | +Jul 20, 2016 |
A denial of service vulnerability in Mediaserver could enable a remote attacker to use a specially crafted file to cause a device hang or reboot. This issue is rated as High due to the possibility of remote denial of service.
-CVE | -References | -Severity | -Updated Google devices | -Updated AOSP versions | -Date reported | +CVE | +References | +Severity | +Updated Google devices | +Updated AOSP versions | +Date reported |
---|---|---|---|---|---|---|---|---|---|---|---|
CVE-2017-0390 | -A-31647370 | -High | -All | -4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1 | -Sep 19, 2016 | +CVE-2017-0390 | ++ A-31647370 | +High | +All | +4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1 | +Sep 19, 2016 |
CVE-2017-0391 | -A-32322258 | -High | -All | -6.0, 6.0.1, 7.0, 7.1 | -Oct 20, 2016 | +CVE-2017-0391 | ++ A-32322258 | +High | +All | +6.0, 6.0.1, 7.0, 7.1 | +Oct 20, 2016 |
CVE-2017-0392 | -A-32577290 | -High | -All | -4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1 | -Oct 29, 2016 | +CVE-2017-0392 | ++ A-32577290 | +High | +All | +4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1 | +Oct 29, 2016 |
CVE-2017-0393 | -A-30436808 | -High | -All | -4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1 | -Google internal | +CVE-2017-0393 | ++ A-30436808 | +High | +All | +4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1 | +Google internal |
-A denial of service vulnerability in Telephony could enable a remote attacker -to cause a device hang or reboot. This issue is rated as High due to the +A denial of service vulnerability in Telephony could enable a remote attacker to +cause a device hang or reboot. This issue is rated as High due to the possibility of remote denial of service.
-CVE | -References | -Severity | -Updated Google devices | -Updated AOSP versions | -Date reported | +CVE | +References | +Severity | +Updated Google devices | +Updated AOSP versions | +Date reported |
---|---|---|---|---|---|---|---|---|---|---|---|
CVE-2017-0394 | -A-31752213 | -High | -All | -5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1 | -Sep 23, 2016 | +CVE-2017-0394 | ++ A-31752213 | +High | +All | +5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1 | +Sep 23, 2016 |
An elevation of privilege vulnerability in Contacts could enable a local malicious application to silently create contact information. This issue is @@ -984,7 +976,6 @@ rated as Moderate because it is a local bypass of user interaction requirements (access to functionality that would normally require either user initiation or user permission).
-CVE | -References | -Severity | -Updated Google devices | -Updated AOSP versions | -Date reported | +CVE | +References | +Severity | +Updated Google devices | +Updated AOSP versions | +Date reported |
---|---|---|---|---|---|---|---|---|---|---|---|
CVE-2017-0395 | -A-32219099 | -Moderate | -All | -4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1 | -Oct 15, 2016 | +CVE-2017-0395 | ++ A-32219099 | +Moderate | +All | +4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1 | +Oct 15, 2016 |
An information disclosure vulnerability in Mediaserver could enable a local malicious application to access data outside of its permission levels. This issue is rated as Moderate because it could be used to access sensitive data without permission.
-CVE | -References | -Severity | -Updated Google devices | -Updated AOSP versions | -Date reported | +CVE | +References | +Severity | +Updated Google devices | +Updated AOSP versions | +Date reported |
---|---|---|---|---|---|---|---|---|---|---|---|
CVE-2017-0396 | -A-31781965 | -Moderate | -All | -4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1 | -Sep 27, 2016 | +CVE-2017-0396 | ++ A-31781965 | +Moderate | +All | +4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1 | +Sep 27, 2016 |
CVE-2017-0397 | -A-32377688 | -Moderate | -All | -4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1 | -Oct 21, 2016 | +CVE-2017-0397 | ++ A-32377688 | +Moderate | +All | +4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1 | +Oct 21, 2016 |
An information disclosure vulnerability in Audioserver could enable a local malicious application to access data outside of its permission levels. This issue is rated as Moderate because it could be used to access sensitive data without permission.
-CVE | -References | -Severity | -Updated Google devices | -Updated AOSP versions | -Date reported | +CVE | +References | +Severity | +Updated Google devices | +Updated AOSP versions | +Date reported |
---|---|---|---|---|---|---|---|---|---|---|---|
CVE-2017-0398 | -A-32438594 | -Moderate | -All | -4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1 | -Oct 25, 2016 | +CVE-2017-0398 | ++ A-32438594 | +Moderate | +All | +4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1 | +Oct 25, 2016 |
CVE-2017-0398 | -A-32635664 | -Moderate | -All | -4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1 | -Oct 25, 2016 | +CVE-2017-0398 | ++ A-32635664 | +Moderate | +All | +4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1 | +Oct 25, 2016 |
CVE-2017-0398 | -A-32624850 | -Moderate | -All | -4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1 | -Oct 25, 2016 | +CVE-2017-0398 | ++ A-32624850 | +Moderate | +All | +4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1 | +Oct 25, 2016 |
CVE-2017-0399 | -A-32247948 | -Moderate | -All | -4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1 | -Oct 18, 2016 | +CVE-2017-0399 | ++ A-32247948 +[2] | +Moderate | +All | +4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1 | +Oct 18, 2016 |
CVE-2017-0400 | -A-32584034 | -Moderate | -All | -4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1 | -Oct 25, 2016 | +CVE-2017-0400 | ++ A-32584034 +[2] | +Moderate | +All | +4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1 | +Oct 25, 2016 |
CVE-2017-0401 | -A-32448258 | -Moderate | -All | -4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1 | -Oct 26, 2016 | +CVE-2017-0401 | ++ A-32448258 | +Moderate | +All | +4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1 | +Oct 26, 2016 |
CVE-2017-0402 | -A-32436341 | -Moderate | -All | -4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1 | -Oct 25, 2016 | +CVE-2017-0402 | ++ A-32436341 +[2] | +Moderate | +All | +4.4.4, 5.0.2, 5.1.1, 6.0, 6.0.1, 7.0, 7.1 | +Oct 25, 2016 |
@@ -2706,36 +2703,67 @@ access sensitive data without permission.