Danielle Roberts | f6083ab | 2015-11-02 11:58:49 -0800 | [diff] [blame] | 1 | page.title=Nexus Security Bulletin - October 2015 |
| 2 | @jd:body |
| 3 | |
| 4 | <!-- |
| 5 | Copyright 2015 The Android Open Source Project |
| 6 | |
| 7 | Licensed under the Apache License, Version 2.0 (the "License"); |
| 8 | you may not use this file except in compliance with the License. |
| 9 | You may obtain a copy of the License at |
| 10 | |
| 11 | http://www.apache.org/licenses/LICENSE-2.0 |
| 12 | |
| 13 | Unless required by applicable law or agreed to in writing, software |
| 14 | distributed under the License is distributed on an "AS IS" BASIS, |
| 15 | WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| 16 | See the License for the specific language governing permissions and |
| 17 | limitations under the License. |
| 18 | --> |
| 19 | <div id="qv-wrapper"> |
| 20 | <div id="qv"> |
| 21 | <h2>In this document</h2> |
| 22 | <ol id="auto-toc"> |
| 23 | </ol> |
| 24 | </div> |
| 25 | </div> |
| 26 | |
| 27 | <p><em>Published October 05, 2015 | Updated October 12, 2015</em></p> |
| 28 | |
| 29 | <p>We have released a security update to Nexus devices through an over-the-air |
| 30 | (OTA) update as part of our Android Security Bulletin Monthly Release process. |
| 31 | The Nexus firmware images have also been released to the <a href="https://developers.google.com/android/nexus/images">Google Developer site</a>. Builds LMY48T or later (such as LMY48W) and Android M with Security Patch |
| 32 | Level of October 1, 2015 or later address these issues. Refer to the <a href="https://support.google.com/nexus/answer/4457705">Nexus documentation</a> for instructions on how to check the security patch level. </p> |
| 33 | |
| 34 | <p>Partners were notified about these issues on September 10, 2015 or earlier. |
| 35 | Source code patches for these issues have been released to the Android Open |
| 36 | Source Project (AOSP) repository.</p> |
| 37 | |
| 38 | <p>The most severe of these issues is a Critical security vulnerability that could |
| 39 | enable remote code execution on an affected device through multiple methods |
| 40 | such as email, web browsing, and MMS when processing media files.</p> |
| 41 | |
| 42 | <p>We have had no reports of active customer exploitation of these newly reported |
| 43 | issues. Refer to the <a href="#mitigations">Mitigations</a> section for details on the <a href="{@docRoot}security/enhancements/index.html">Android security platform protections</a> and service protections such as SafetyNet, which improve the security of the |
| 44 | Android platform. We encourage all customers to accept these updates to their |
| 45 | devices. </p> |
| 46 | |
| 47 | <h2 id=security_vulnerability_summary>Security Vulnerability Summary</h2> |
| 48 | |
| 49 | |
| 50 | <p>The table below contains a list of security vulnerabilities, the Common |
| 51 | Vulnerability and Exposures ID (CVE), and their assessed severity. The <a href="{@docRoot}security/overview/updates-resources.html#severity">severity assessment</a> is based on the effect that exploiting the vulnerability would have on an |
| 52 | affected device, assuming the platform and service mitigations are disabled for |
| 53 | development purposes or if successfully bypassed. </p> |
| 54 | <table> |
| 55 | <tr> |
| 56 | <th>Issue</th> |
| 57 | <th>CVE</th> |
| 58 | <th>Severity</th> |
| 59 | </tr> |
| 60 | <tr> |
| 61 | <td>Remote Code Execution Vulnerabilities in libstagefright </td> |
| 62 | <td>CVE-2015-3873<br /> |
| 63 | CVE-2015-3872<br /> |
| 64 | CVE-2015-3871<br /> |
| 65 | CVE-2015-3868<br /> |
| 66 | CVE-2015-3867<br /> |
| 67 | CVE-2015-3869<br /> |
| 68 | CVE-2015-3870<br /> |
| 69 | CVE-2015-3823<br /> |
| 70 | CVE-2015-6598<br /> |
| 71 | CVE-2015-6599<br /> |
| 72 | CVE-2015-6600<br /> |
| 73 | CVE-2015-3870<br /> |
| 74 | CVE-2015-6601<br /> |
| 75 | CVE-2015-3876<br /> |
| 76 | CVE-2015-6604</td> |
| 77 | <td>Critical</td> |
| 78 | </tr> |
| 79 | <tr> |
| 80 | <td>Remote Code Execution Vulnerabilities in Sonivox</td> |
| 81 | <td>CVE-2015-3874</td> |
| 82 | <td>Critical</td> |
| 83 | </tr> |
| 84 | <tr> |
| 85 | <td>Remote Code Execution Vulnerabilities in libutils</td> |
| 86 | <td>CVE-2015-3875<br /> |
| 87 | CVE-2015-6602</td> |
| 88 | <td>Critical</td> |
| 89 | </tr> |
| 90 | <tr> |
| 91 | <td>Remote Code Execution Vulnerability in Skia</td> |
| 92 | <td>CVE-2015-3877</td> |
| 93 | <td>Critical</td> |
| 94 | </tr> |
| 95 | <tr> |
| 96 | <td>Remote Code Execution Vulnerability in libFLAC</td> |
| 97 | <td>CVE-2014-9082</td> |
| 98 | <td>Critical</td> |
| 99 | </tr> |
| 100 | <tr> |
| 101 | <td>Elevation of Privilege Vulnerability in KeyStore</td> |
| 102 | <td>CVE-2015-3863</td> |
| 103 | <td>High</td> |
| 104 | </tr> |
| 105 | <tr> |
| 106 | <td>Elevation of Privilege Vulnerability in Media Player Framework</td> |
| 107 | <td>CVE-2015-3879</td> |
| 108 | <td>High</td> |
| 109 | </tr> |
| 110 | <tr> |
| 111 | <td>Elevation of Privilege Vulnerability in Android Runtime</td> |
| 112 | <td>CVE-2015-3865</td> |
| 113 | <td>High</td> |
| 114 | </tr> |
| 115 | <tr> |
| 116 | <td>Elevation of Privilege Vulnerabilities in Mediaserver </td> |
| 117 | <td>CVE-2015-6596</td> |
| 118 | <td>High</td> |
| 119 | </tr> |
| 120 | <tr> |
| 121 | <td>Elevation of Privilege Vulnerability in Secure Element Evaluation Kit</td> |
| 122 | <td>CVE-2015-6606</td> |
| 123 | <td>High</td> |
| 124 | </tr> |
| 125 | <tr> |
| 126 | <td>Elevation of Privilege Vulnerability in Media Projection</td> |
| 127 | <td>CVE-2015-3878</td> |
| 128 | <td>Moderate</td> |
| 129 | </tr> |
| 130 | <tr> |
| 131 | <td>Elevation of Privilege Vulnerability in Bluetooth</td> |
| 132 | <td> CVE-2015-3847</td> |
| 133 | <td>Moderate</td> |
| 134 | </tr> |
| 135 | <tr> |
| 136 | <td>Elevation of Privilege Vulnerabilities in SQLite</td> |
| 137 | <td>CVE-2015-6607</td> |
| 138 | <td>Moderate</td> |
| 139 | </tr> |
| 140 | <tr> |
| 141 | <td>Denial of Service Vulnerabilities in Mediaserver</td> |
| 142 | <td>CVE-2015-6605<br /> |
| 143 | CVE-2015-3862</td> |
| 144 | <td>Low</td> |
| 145 | </tr> |
| 146 | </table> |
| 147 | |
| 148 | |
| 149 | <h2 id=mitigations>Mitigations</h2> |
| 150 | |
| 151 | |
| 152 | <p>This is a summary of the mitigations provided by the <a href="{@docRoot}security/enhancements/index.html">Android security platform</a> and service protections such as SafetyNet. These capabilities reduce the |
| 153 | likelihood that security vulnerabilities can be successfully exploited on |
| 154 | Android. </p> |
| 155 | |
| 156 | <ul> |
| 157 | <li> Exploitation for many issues on Android is made more difficult by enhancements |
| 158 | in newer versions of the Android platform. We encourage all users to update to |
| 159 | the latest version of Android where possible. |
| 160 | <li> The Android Security team is actively monitoring for abuse with Verify Apps and |
| 161 | SafetyNet which will warn about potentially harmful applications about to be |
| 162 | installed. Device rooting tools are prohibited within Google Play. To protect |
| 163 | users who install applications from outside of Google Play, Verify Apps is |
| 164 | enabled by default and will warn users about known rooting applications. Verify |
| 165 | Apps attempts to identify and block installation of known malicious |
| 166 | applications that exploit a privilege escalation vulnerability. If such an |
| 167 | application has already been installed, Verify Apps will notify the user and |
| 168 | attempt to remove any such applications. |
| 169 | <li> As appropriate, Google has updated the Hangouts and Messenger applications so |
| 170 | that media is not automatically passed to vulnerable processes (such as |
| 171 | mediaserver.) |
| 172 | </ul> |
| 173 | |
| 174 | <h2 id=acknowledgements>Acknowledgements</h2> |
| 175 | |
| 176 | |
| 177 | <p>We would like to thank these researchers for their contributions:</p> |
| 178 | |
| 179 | <ul> |
| 180 | <li> Brennan Lautner: CVE-2015-3863 |
| 181 | <li> Yajin Zhou, Lei Wu, and Xuxian Jiang of C0re Team from Qihoo 360: CVE-2015-3868, |
| 182 | CVE-2015-3869, CVE-2015-3865, CVE-2015-3862 |
| 183 | <li> Daniel Micay (daniel.micay@copperhead.co) at Copperhead Security: CVE-2015-3875 |
| 184 | <li> dragonltx of Alibaba Mobile Security Team: CVE-2015-6599 |
| 185 | <li> Ian Beer and Steven Vittitoe of Google Project Zero: CVE-2015-6604 |
| 186 | <li> Joaquín Rinaudo (@xeroxnir) and Iván Arce (@4Dgifts) of Programa STIC at |
| 187 | Fundación Dr. Manuel Sadosky, Buenos Aires Argentina: CVE-2015-3870 |
| 188 | <li> Josh Drake of Zimperium: CVE-2015-3876, CVE-2015-6602 |
| 189 | <li> Jordan Gruskovnjak of Exodus Intelligence (@jgrusko): CVE-2015-3867 |
| 190 | <li> Peter Pi of Trend Micro: CVE-2015-3872, CVE-2015-3871 |
| 191 | <li> Ping Li of Qihoo 360 Technology Co. Ltd: CVE-2015-3878 |
| 192 | <li> Seven Shen: CVE-2015-6600, CVE-2015-3847 |
| 193 | <li> Wangtao(neobyte) of Baidu X-Team: CVE-2015-6598 |
| 194 | <li> Wish Wu of Trend Micro Inc. (@wish_wu): CVE-2015-3823 |
| 195 | </ul> |
| 196 | |
| 197 | <p>We would also like to acknowledge the contributions of the Chrome Security |
| 198 | Team, Google Security Team, Project Zero, and other individuals within Google |
| 199 | for reporting several issues fixed in this bulletin.</p> |
| 200 | |
| 201 | <h2 id=security_vulnerability_details>Security Vulnerability Details</h2> |
| 202 | |
| 203 | |
| 204 | <p>In the sections below, we provide details for each of the security |
| 205 | vulnerabilities listed in the <a href="#security_vulnerability_summary">Security Vulnerability Summary</a> above. There is a description of the issue, a severity rationale, and a table |
| 206 | with the CVE, associated bug, severity, affected versions, and date reported. |
| 207 | Where available, we’ve linked the AOSP commit that addressed the issue to the |
| 208 | bug ID. When multiple changes relate to a single bug, additional AOSP |
| 209 | references are linked to numbers following the bug ID.</p> |
| 210 | |
| 211 | <h3 id=remote_code_execution_vulnerabilities_in_libstagefright>Remote Code Execution Vulnerabilities in libstagefright</h3> |
| 212 | |
| 213 | |
| 214 | <p>Vulnerabilities in libstagefright exist that could allow an attacker, during |
| 215 | media file and data processing of a specially crafted file, to cause memory |
| 216 | corruption and remote code execution in the mediaserver service.</p> |
| 217 | |
| 218 | <p>These issues are rated as a Critical severity due to the possibility of remote |
| 219 | code execution as a privileged service. The affected components have access to |
| 220 | audio and video streams as well as access to privileges that third-party |
| 221 | applications cannot normally access.</p> |
| 222 | <table> |
| 223 | <tr> |
| 224 | <th>CVE</th> |
| 225 | <th>Bug(s) with AOSP links</th> |
| 226 | <th>Severity</th> |
| 227 | <th>Affected versions</th> |
| 228 | <th>Date reported</th> |
| 229 | </tr> |
| 230 | <tr> |
| 231 | <td rowspan="14">CVE-2015-3873</td> |
| 232 | <td><a href="https://android.googlesource.com/platform%2Fframeworks%2Fav/+/c23e3dd8af7397f023aae040c4a03dd14091cbed">ANDROID-20674086</a> [<a href="https://android.googlesource.com/platform%2Fframeworks%2Fav/+/9abb7401df730b5c510f6b8dac2716a0928d9623">2</a>,<a href="https://android.googlesource.com/platform%2Fframeworks%2Fav/+/b62a73b860757143d3b140b2985fdae71e18d675">3</a>,<a href="https://android.googlesource.com/platform%2Fframeworks%2Fav/+/b2ae4351539de9aa4667fcb3e02ba40d9c6bd094">4</a>]</td> |
| 233 | <td rowspan="13">Critical</td> |
| 234 | <td rowspan="13">5.1 and below</td> |
| 235 | <td rowspan="13">Google Internal </td> |
| 236 | </tr> |
| 237 | <tr> |
| 238 | <td><a href="https://android.googlesource.com/platform%2Fframeworks%2Fav/+/3fd96683850cf27648e036180acb149fac362242">ANDROID-20674674</a> [<a href="https://android.googlesource.com/platform%2Fframeworks%2Fav/+/65842db06c2d77e53cc5ac61692160d844cc7d0a">2</a>,<a href="https://android.googlesource.com/platform%2Fframeworks%2Fav/+/38eff9af5c032bf12f89d6e94df05f65eef51afc">3</a>,<a href="https://android.googlesource.com/platform%2Fframeworks%2Fav/+/91860b89488b3ee4644c539e89e657fbb79fb6ad">4</a>]</td> |
| 239 | </tr> |
| 240 | <tr> |
| 241 | <td><a href="https://android.googlesource.com/platform%2Fexternal%2Ftremolo/+/2e941e40ce76eb13b273479a4ee8fb6e40d33795">ANDROID-20718524 </a></td> |
| 242 | </tr> |
| 243 | <tr> |
| 244 | <td><a href="https://android.googlesource.com/platform%2Fexternal%2Ftremolo/+/06ca06ac6107f88530cc67225c47537621bb41a5">ANDROID-21048776</a></td> |
| 245 | </tr> |
| 246 | <tr> |
| 247 | <td><a href="https://android.googlesource.com/platform%2Fframeworks%2Fav/+/dc5e47f013bfbb74c5c35ad976aa98d480cb351b">ANDROID-21443020</a></td> |
| 248 | </tr> |
| 249 | <tr> |
| 250 | <td><a href="https://android.googlesource.com/platform%2Fframeworks%2Fav/+/f11e95b21007f24e5ab77298370855f9f085b2d7">ANDROID-21814993 </a></td> |
| 251 | </tr> |
| 252 | <tr> |
| 253 | <td><a href="https://android.googlesource.com/platform%2Fframeworks%2Fav/+/f810a8298aea13fa177060cdc10c8297eac69c49">ANDROID-22008959 </a></td> |
| 254 | </tr> |
| 255 | <tr> |
| 256 | <td><a href="https://android.googlesource.com/platform%2Fframeworks%2Fav/+/7913508110c80da87fb085514208adbd874d7d54">ANDROID-22077698</a></td> |
| 257 | </tr> |
| 258 | <tr> |
| 259 | <td><a href="https://android.googlesource.com/platform%2Fframeworks%2Fav/+/073e4f6748f5d7deb095c42fad9271cb99e22d07">ANDROID-22388975</a> </td> |
| 260 | </tr> |
| 261 | <tr> |
| 262 | <td><a href="https://android.googlesource.com/platform%2Fframeworks%2Fav/+/bf47eb9c67ed364f3c288954857aab9d9311db4c">ANDROID-22845824</a> </td> |
| 263 | </tr> |
| 264 | <tr> |
| 265 | <td><a href="https://android.googlesource.com/platform%2Fframeworks%2Fav/+/b158a9a5bcfe21480f57bc58d45517f1a81cca39">ANDROID-23016072</a></td> |
| 266 | </tr> |
| 267 | <tr> |
| 268 | <td><a href="https://android.googlesource.com/platform%2Fframeworks%2Fav/+/5a132594b531f1f48098a790927f82080cc27f61">ANDROID-23247055 </a></td> |
| 269 | </tr> |
| 270 | <tr> |
| 271 | <td><a href="https://android.googlesource.com/platform%2Fframeworks%2Fav/+/d2ebc0b9e147f9406db20ec4df61da50e3614ee4">ANDROID-23248776</a> </td> |
| 272 | </tr> |
| 273 | <tr> |
| 274 | <td><a href="https://android.googlesource.com/platform%2Fframeworks%2Fav/+/3179e3b3531b5fe93dc7f5b2c378e27010a406d5">ANDROID-20721050</a></td> |
| 275 | <td>Critical</td> |
| 276 | <td>5.0 and 5.1</td> |
| 277 | <td>Google Internal </td> |
| 278 | </tr> |
| 279 | <tr> |
| 280 | <td>CVE-2015-3823</td> |
| 281 | <td><a href="https://android.googlesource.com/platform%2Fframeworks%2Fav/+/407d475b797fdc595299d67151230dc6e3835ccd">ANDROID-21335999 </a></td> |
| 282 | <td>Critical</td> |
| 283 | <td>5.1 and below</td> |
| 284 | <td>May 20, 2015</td> |
| 285 | </tr> |
| 286 | <tr> |
| 287 | <td>CVE-2015-6600</td> |
| 288 | <td><a href="https://android.googlesource.com/platform%2Fframeworks%2Fav/+/e6f5d47a7f9eab8a0009f8a563de473cd47d3110">ANDROID-22882938 </a></td> |
| 289 | <td>Critical</td> |
| 290 | <td>5.1 and below</td> |
| 291 | <td>Jul 31, 2015</td> |
| 292 | </tr> |
| 293 | <tr> |
| 294 | <td>CVE-2015-6601</td> |
| 295 | <td><a href="https://android.googlesource.com/platform%2Fframeworks%2Fav/+/738a753a3ca7bf8f9f608ca941575626265294e4">ANDROID-22935234</a></td> |
| 296 | <td>Critical</td> |
| 297 | <td>5.1 and below</td> |
| 298 | <td>Aug 3, 2015</td> |
| 299 | </tr> |
| 300 | <tr> |
| 301 | <td>CVE-2015-3869</td> |
| 302 | <td><a href="https://android.googlesource.com/platform%2Fframeworks%2Fav/+/450e1015b7939292ca988dd1b4f0303a094478e9">ANDROID-23036083</a></td> |
| 303 | <td>Critical</td> |
| 304 | <td>5.1 and below</td> |
| 305 | <td>Aug 4, 2015</td> |
| 306 | </tr> |
| 307 | <tr> |
| 308 | <td>CVE-2015-3870</td> |
| 309 | <td><a href="https://android.googlesource.com/platform%2Fframeworks%2Fav/+/4bce636865bdf0e2a79fc9a5d9a69107649c850d">ANDROID-22771132</a></td> |
| 310 | <td>Critical</td> |
| 311 | <td>5.1 and below</td> |
| 312 | <td>Aug 5, 2015</td> |
| 313 | </tr> |
| 314 | <tr> |
| 315 | <td>CVE-2015-3871</td> |
| 316 | <td><a href="https://android.googlesource.com/platform%2Fframeworks%2Fav/+/c570778430a22b5488cae72982cf9fb8033dbda3">ANDROID-23031033</a></td> |
| 317 | <td>Critical</td> |
| 318 | <td>5.1 and below</td> |
| 319 | <td>Aug 6, 2015</td> |
| 320 | </tr> |
| 321 | <tr> |
| 322 | <td>CVE-2015-3868</td> |
| 323 | <td><a href="https://android.googlesource.com/platform%2Fframeworks%2Fav/+/937c6bedd4b6e5c6cb29a238eb459047dedd3486">ANDROID-23270724</a></td> |
| 324 | <td>Critical</td> |
| 325 | <td>5.1 and below</td> |
| 326 | <td>Aug 6, 2015</td> |
| 327 | </tr> |
| 328 | <tr> |
| 329 | <td>CVE-2015-6604</td> |
| 330 | <td><a href="https://android.googlesource.com/platform%2Fframeworks%2Fav/+/f51115bd8e44c2779b74477277c6f6046916e7cf">ANDROID-23129786</a></td> |
| 331 | <td>Critical</td> |
| 332 | <td>5.1 and below</td> |
| 333 | <td>Aug 11, 2015</td> |
| 334 | </tr> |
| 335 | <tr> |
| 336 | <td>CVE-2015-3867</td> |
| 337 | <td><a href="https://android.googlesource.com/platform%2Fframeworks%2Fav/+/7e9ac3509d72e8dc6f1316b5ce0a0066638b9737">ANDROID-23213430</a></td> |
| 338 | <td>Critical</td> |
| 339 | <td>5.1 and below</td> |
| 340 | <td>Aug 14, 2015</td> |
| 341 | </tr> |
| 342 | <tr> |
| 343 | <td>CVE-2015-6603</td> |
| 344 | <td><a href="https://android.googlesource.com/platform%2Fframeworks%2Fav/+/c37f7f6fa0cb7f55cdc5b2d4ccbf2c87c3bc6c3b">ANDROID-23227354 </a></td> |
| 345 | <td>Critical</td> |
| 346 | <td>5.1 and below</td> |
| 347 | <td>Aug 15,2015</td> |
| 348 | </tr> |
| 349 | <tr> |
| 350 | <td>CVE-2015-3876</td> |
| 351 | <td><a href="https://android.googlesource.com/platform%2Fframeworks%2Fav/+/c580c836c1941fb4912e1dd4e08626caf98a62c7">ANDROID-23285192</a></td> |
| 352 | <td>Critical</td> |
| 353 | <td>5.1 and below</td> |
| 354 | <td>Aug 15, 2015</td> |
| 355 | </tr> |
| 356 | <tr> |
| 357 | <td>CVE-2015-6598</td> |
| 358 | <td><a href="https://android.googlesource.com/platform%2Fframeworks%2Fav/+/ba6093a4c6997b9d36d9700ee8c974941bf82e3a">ANDROID-23306638</a></td> |
| 359 | <td>Critical</td> |
| 360 | <td>5.1 and below</td> |
| 361 | <td>Aug 18, 2015</td> |
| 362 | </tr> |
| 363 | <tr> |
| 364 | <td>CVE-2015-3872</td> |
| 365 | <td><a href="https://android.googlesource.com/platform%2Fframeworks%2Fav/+/4d46f6f18f5160b8992ec1e66ef1844212fc7d48">ANDROID-23346388</a></td> |
| 366 | <td>Critical</td> |
| 367 | <td>5.1 and below</td> |
| 368 | <td>Aug 19, 2015</td> |
| 369 | </tr> |
| 370 | <tr> |
| 371 | <td>CVE-2015-6599</td> |
| 372 | <td><a href="https://android.googlesource.com/platform%2Fframeworks%2Fav/+/af7e33f6043c0be1c0310d675884e3b263ca2438">ANDROID-23416608 </a></td> |
| 373 | <td>Critical</td> |
| 374 | <td>5.1 and below</td> |
| 375 | <td>Aug 21, 2015</td> |
| 376 | </tr> |
| 377 | </table> |
| 378 | |
| 379 | |
| 380 | <h3 id=remote_code_execution_vulnerabilities_in_sonivox>Remote Code Execution Vulnerabilities in Sonivox</h3> |
| 381 | |
| 382 | |
| 383 | <p>Vulnerabilities in Sonivox exist that could allow an attacker, during media |
| 384 | file processing of a specially crafted file, to cause memory corruption and |
| 385 | remote code execution in the mediaserver service. This issue is rated as a |
| 386 | Critical severity due to the possibility of remote code execution as a |
| 387 | privileged service. The affected component has access to audio and video |
| 388 | streams as well as access to privileges that third-party applications cannot |
| 389 | normally access.</p> |
| 390 | <table> |
| 391 | <tr> |
| 392 | <th>CVE</th> |
| 393 | <th>Bug(s) with AOSP links</th> |
| 394 | <th>Severity</th> |
| 395 | <th>Affected versions</th> |
| 396 | <th>Date reported</th> |
| 397 | </tr> |
| 398 | <tr> |
| 399 | <td rowspan="3">CVE-2015-3874</td> |
| 400 | <td><a href="https://android.googlesource.com/platform%2Fexternal%2Fsonivox/+/8cbef48ba6e3d3f844b895f8ca1a1aee74414fff">ANDROID-23335715</a> </td> |
| 401 | <td rowspan="3">Critical</td> |
| 402 | <td rowspan="3">5.1 and below</td> |
| 403 | <td rowspan="3">Multiple</td> |
| 404 | </tr> |
| 405 | <tr> |
| 406 | <td><a href="https://android.googlesource.com/platform%2Fexternal%2Fsonivox/+/5d2e7de37d4a28cf25cc5d0c64b3a29c1824dc0a">ANDROID-23307276</a> [<a href="https://android.googlesource.com/platform%2Fexternal%2Fsonivox/+/f333a822c38c3d92f40e8f1686348e6a62c291">2</a>]</td> |
| 407 | </tr> |
| 408 | <tr> |
| 409 | <td><a href="https://android.googlesource.com/platform%2Fexternal%2Fsonivox/+/8a9f53ee2c661e8b5b94d6e9fbb8af3baa34310d">ANDROID-23286323</a></td> |
| 410 | </tr> |
| 411 | </table> |
| 412 | |
| 413 | |
| 414 | <h3 id=remote_code_execution_vulnerabilities_in_libutils>Remote Code Execution Vulnerabilities in libutils </h3> |
| 415 | |
| 416 | |
| 417 | <p>Vulnerabilities in libutils, a generic library, exist in audio file processing. |
| 418 | These vulnerabilities could allow an attacker, during processing of a specially |
| 419 | crafted file, to cause memory corruption and remote code execution in a service |
| 420 | that uses this library such as mediaserver.</p> |
| 421 | |
| 422 | <p>The affected functionality is provided as an application API and there are |
| 423 | multiple applications that allow it to be reached with remote content, most |
| 424 | notably MMS and browser playback of media. This issue is rated as a Critical |
| 425 | severity due to the possibility of remote code execution in a privileged |
| 426 | service. The affected component has access to audio and video streams as well |
| 427 | as access to privileges that third-party apps cannot normally access.</p> |
| 428 | <table> |
| 429 | <tr> |
| 430 | <th>CVE</th> |
| 431 | <th>Bug(s) with AOSP links</th> |
| 432 | <th>Severity</th> |
| 433 | <th>Affected versions</th> |
| 434 | <th>Date reported</th> |
| 435 | </tr> |
| 436 | <tr> |
| 437 | <td>CVE-2015-3875</td> |
| 438 | <td><a href="https://android.googlesource.com/platform%2Fsystem%2Fcore/+/0cc9a6e6e1f8e675c1238e5e05418cabcc699b52">ANDROID-22952485</a></td> |
| 439 | <td>Critical</td> |
| 440 | <td>5.1 and below</td> |
| 441 | <td>Aug 15, 2015</td> |
| 442 | </tr> |
| 443 | <tr> |
| 444 | <td>CVE-2015-6602</td> |
| 445 | <td><a href="https://android.googlesource.com/platform%2Fsystem%2Fcore/+/e0dce90b0de2b2b7c2baae8035f810a55526effb">ANDROID-23290056</a> [<a href="https://android.googlesource.com/platform%2Fsystem%2Fcore/+/5b85b1d40d619c2064d321364f212ebfeb6ba185">2</a>]</td> |
| 446 | <td>Critical</td> |
| 447 | <td>5.1 and below</td> |
| 448 | <td>Aug 15, 2015</td> |
| 449 | </tr> |
| 450 | </table> |
| 451 | |
| 452 | |
| 453 | <h3 id=remote_code_execution_vulnerability_in_skia>Remote Code Execution Vulnerability in Skia</h3> |
| 454 | |
| 455 | |
| 456 | <p>A vulnerability in the Skia component may be leveraged when processing a |
| 457 | specially crafted media file, that could lead to memory corruption and remote |
| 458 | code execution in a privileged process. This issue is rated as a Critical |
| 459 | severity due to the possibility of remote code execution through multiple |
| 460 | attack methods such as email, web browsing, and MMS when processing media |
| 461 | files.</p> |
| 462 | <table> |
| 463 | <tr> |
| 464 | <th>CVE</th> |
| 465 | <th>Bug(s) with AOSP links</th> |
| 466 | <th>Severity</th> |
| 467 | <th>Affected versions</th> |
| 468 | <th>Date reported</th> |
| 469 | </tr> |
| 470 | <tr> |
| 471 | <td>CVE-2015-3877</td> |
| 472 | <td><a href="https://android.googlesource.com/platform%2Fexternal%2Fskia/+/55ad31336a6de7037139820558c5de834797c09e">ANDROID-20723696</a></td> |
| 473 | <td>Critical</td> |
| 474 | <td>5.1 and below</td> |
| 475 | <td>Jul 30, 2015</td> |
| 476 | </tr> |
| 477 | </table> |
| 478 | |
| 479 | |
| 480 | <h3 id=remote_code_execution_vulnerabilities_in_libflac>Remote Code Execution Vulnerabilities in libFLAC</h3> |
| 481 | |
| 482 | |
| 483 | <p>A vulnerability in libFLAC exists in media file processing. These |
| 484 | vulnerabilities could allow an attacker, during processing of a specially |
| 485 | crafted file, to cause memory corruption and remote code execution.</p> |
| 486 | |
| 487 | <p>The affected functionality is provided as an application API and there are |
| 488 | multiple applications that allow it to be reached with remote content, such as |
| 489 | browser playback of media. This issue is rated as a Critical severity due to |
| 490 | the possibility of remote code execution in a privileged service. The affected |
| 491 | component has access to audio and video streams as well as access to privileges |
| 492 | that third-party apps cannot normally access.</p> |
| 493 | <table> |
| 494 | <tr> |
| 495 | <th>CVE</th> |
| 496 | <th>Bug(s) with AOSP links</th> |
| 497 | <th>Severity</th> |
| 498 | <th>Affected versions</th> |
| 499 | <th>Date reported</th> |
| 500 | </tr> |
| 501 | <tr> |
| 502 | <td>CVE-2014-9028</td> |
| 503 | <td><a href="https://android.googlesource.com/platform%2Fexternal%2Fflac/+/fe03f73d86bb415f5d5145f0de091834d89ae3a9">ANDROID-18872897</a> [<a href="https://android.googlesource.com/platform%2Fexternal%2Fflac/+/5859ae22db0a2d16af3e3ca19d582de37daf5eb6">2</a>]</td> |
| 504 | <td>Critical</td> |
| 505 | <td>5.1 and below</td> |
| 506 | <td>Nov 14, 2014</td> |
| 507 | </tr> |
| 508 | </table> |
| 509 | |
| 510 | |
| 511 | <p> |
| 512 | </p> |
| 513 | |
| 514 | <h3 id=elevation_of_privilege_vulnerability_in_keystore>Elevation of Privilege Vulnerability in KeyStore</h3> |
| 515 | |
| 516 | |
| 517 | <p>An elevation of privilege vulnerability in the KeyStore component may be |
| 518 | leveraged by a malicious application when calling into the KeyStore APIs. This |
| 519 | application could cause memory corruption and arbitrary code execution in the |
| 520 | context of KeyStore. This issue is rated as High severity because it can be |
| 521 | used to access privileges which are not directly accessible to a third-party |
| 522 | application.</p> |
| 523 | <table> |
| 524 | <tr> |
| 525 | <th>CVE</th> |
| 526 | <th>Bug(s) with AOSP links</th> |
| 527 | <th>Severity</th> |
| 528 | <th>Affected versions</th> |
| 529 | <th>Date reported</th> |
| 530 | </tr> |
| 531 | <tr> |
| 532 | <td>CVE-2015-3863</td> |
| 533 | <td><a href="https://android.googlesource.com/platform%2Fsystem%2Fsecurity/+/0d5935262dbbcaf2cf6145529ffd71a728ef4609">ANDROID-22802399</a></td> |
| 534 | <td>High</td> |
| 535 | <td>5.1 and below</td> |
| 536 | <td>Jul 28, 2015</td> |
| 537 | </tr> |
| 538 | </table> |
| 539 | |
| 540 | |
| 541 | <h3 id=elevation_of_privilege_vulnerability_in_media_player_framework>Elevation of Privilege Vulnerability in Media Player Framework</h3> |
| 542 | |
| 543 | |
| 544 | <p>An elevation of privilege vulnerability in the media player framework component |
| 545 | could allow a malicious application to execute arbitrary code within the |
| 546 | context of mediaserver. This issue is rated as High severity because it allows |
| 547 | a malicious application to access privileges not accessible to a third-party |
| 548 | application.</p> |
| 549 | <table> |
| 550 | <tr> |
| 551 | <th>CVE</th> |
| 552 | <th>Bug(s) with AOSP links</th> |
| 553 | <th>Severity</th> |
| 554 | <th>Affected versions</th> |
| 555 | <th>Date reported</th> |
| 556 | </tr> |
| 557 | <tr> |
| 558 | <td>CVE-2015-3879</td> |
| 559 | <td><a href="https://android.googlesource.com/platform%2Fframeworks%2Fav/+/aa4da6fa7ca2454f0713de0a5a583b5b8160166b">ANDROID-23223325</a> [2]*</td> |
| 560 | <td>High</td> |
| 561 | <td>5.1 and below</td> |
| 562 | <td>Aug 14, 2015</td> |
| 563 | </tr> |
| 564 | </table> |
| 565 | |
| 566 | |
| 567 | <p>* A second change for this issue is not in AOSP. The update is contained in the |
| 568 | latest binary drivers for Nexus devices available from the <a href="https://developers.google.com/android/nexus/drivers">Google Developer site</a>. |
| 569 | </p> |
| 570 | |
| 571 | <h3 id=elevation_of_privilege_vulnerability_in_android_runtime>Elevation of Privilege Vulnerability in Android Runtime</h3> |
| 572 | |
| 573 | |
| 574 | <p>An elevation of privilege vulnerability in Android Runtime can enable a local |
| 575 | malicious application to execute arbitrary code within the context of an |
| 576 | elevated system application. This issue is rated as High severity because it |
| 577 | can be used to gain elevated capabilities, such as <a href="http://developer.android.com/guide/topics/manifest/permission-element.html#plevel">Signature</a> or <a href="http://developer.android.com/guide/topics/manifest/permission-element.html#plevel">SignatureOrSystem</a> permissions privileges, which are not accessible to a third-party application.</p> |
| 578 | <table> |
| 579 | <tr> |
| 580 | <th>CVE</th> |
| 581 | <th>Bug(s) with AOSP links</th> |
| 582 | <th>Severity</th> |
| 583 | <th>Affected versions</th> |
| 584 | <th>Date reported</th> |
| 585 | </tr> |
| 586 | <tr> |
| 587 | <td>CVE-2015-3865</td> |
| 588 | <td><a href="https://android.googlesource.com/platform%2Fframeworks%2Fbase/+/ff8dc21278b19b22ed8dc9f9475850838336d351">ANDROID-23050463</a> [<a href="https://android.googlesource.com/platform%2Fcts/+/3f7334822ba4cc53f81f22f3519093bf4e1d7f89">2</a>]</td> |
| 589 | <td>High</td> |
| 590 | <td>5.1 and below</td> |
| 591 | <td>Aug 8, 2015</td> |
| 592 | </tr> |
| 593 | </table> |
| 594 | |
| 595 | |
| 596 | <h3 id=elevation_of_privilege_vulnerabilities_in_mediaserver>Elevation of Privilege Vulnerabilities in Mediaserver</h3> |
| 597 | |
| 598 | |
| 599 | <p>There are multiple vulnerabilities in mediaserver that can enable a local |
| 600 | malicious application to execute arbitrary code within the context of a |
| 601 | privileged native service. This issue is rated as High severity because it can |
| 602 | be used to access privileges that are not directly accessible to a third-party |
| 603 | application.</p> |
| 604 | <table> |
| 605 | <tr> |
| 606 | <th>CVE</th> |
| 607 | <th>Bug(s) with AOSP links</th> |
| 608 | <th>Severity</th> |
| 609 | <th>Affected versions</th> |
| 610 | <th>Date reported</th> |
| 611 | </tr> |
| 612 | <tr> |
| 613 | <td rowspan="3">CVE-2015-6596</td> |
| 614 | <td><a href="https://android.googlesource.com/platform%2Fframeworks%2Fav/+/b97ee930e4f7ed1587b869c92b4aa1dc90b641cc">ANDROID-20731946</a></td> |
| 615 | <td rowspan="2">High</td> |
| 616 | <td rowspan="2">5.1 and below</td> |
| 617 | <td rowspan="2">Multiple</td> |
| 618 | </tr> |
| 619 | <tr> |
| 620 | <td>ANDROID-20719651*</td> |
| 621 | </tr> |
| 622 | <tr> |
| 623 | <td><a href="https://android.googlesource.com/platform%2Fframeworks%2Fav/+/9ef830c6dbd4f6000b94abee3df14b9e27a38294">ANDROID-19573085</a></td> |
| 624 | <td>High</td> |
| 625 | <td>5.0 - 6.0</td> |
| 626 | <td>Google Internal</td> |
| 627 | </tr> |
| 628 | </table> |
| 629 | |
| 630 | |
| 631 | <p>* The patch for this issue is not in AOSP. The update is contained in the |
| 632 | latest binary drivers for Nexus devices available from the <a href="https://developers.google.com/android/nexus/drivers">Google Developer site</a>. |
| 633 | </p> |
| 634 | |
| 635 | <h3 id=elevation_of_privilege_vulnerability_in_secure_element_evaluation_kit>Elevation of Privilege Vulnerability in Secure Element Evaluation Kit</h3> |
| 636 | |
| 637 | |
| 638 | <p>A vulnerability in the <a href="http://seek-for-android.github.io/">SEEK</a> (Secure Element Evaluation Kit, a.k.a. the SmartCard API) plugin could allow |
| 639 | an application to obtain elevated permissions without requesting them. This |
| 640 | issue is rated as High severity because it can be used to gain elevated |
| 641 | capabilities, such as <a href="http://developer.android.com/guide/topics/manifest/permission-element.html#plevel">Signature</a> or <a href="http://developer.android.com/guide/topics/manifest/permission-element.html#plevel">SignatureOrSystem</a> permissions privileges, which are not accessible to third-party applications. </p> |
| 642 | <table> |
| 643 | <tr> |
| 644 | <th>CVE</th> |
| 645 | <th>Bug(s) with AOSP links</th> |
| 646 | <th>Severity</th> |
| 647 | <th>Affected versions</th> |
| 648 | <th>Date reported</th> |
| 649 | </tr> |
| 650 | <tr> |
| 651 | <td>CVE-2015-6606</td> |
| 652 | <td>ANDROID-22301786*</td> |
| 653 | <td>High</td> |
| 654 | <td>5.1 and below</td> |
| 655 | <td>Jun 30, 2015</td> |
| 656 | </tr> |
| 657 | </table> |
| 658 | |
| 659 | |
| 660 | <p>* The upgrade that addresses this issue is located at the <a href="http://seek-for-android.github.io/">SEEK for Android site</a>. |
| 661 | </p> |
| 662 | |
| 663 | <h3 id=elevation_of_privilege_vulnerability_in_media_projection>Elevation of Privilege Vulnerability in Media Projection</h3> |
| 664 | |
| 665 | |
| 666 | <p>A vulnerability in the Media Projection component can allow user data to be |
| 667 | disclosed in the form of screen snapshots. The issue is a result of the |
| 668 | operating system allowing overly long application names. The use of these long |
| 669 | names by a local malicious application may prevent a warning about screen |
| 670 | recording from being visible by the user. This issue is rated as Moderate |
| 671 | severity because it can be used to improperly gain elevated permissions.</p> |
| 672 | <table> |
| 673 | <tr> |
| 674 | <th>CVE</th> |
| 675 | <th>Bug(s) with AOSP links</th> |
| 676 | <th>Severity</th> |
| 677 | <th>Affected versions</th> |
| 678 | <th>Date reported</th> |
| 679 | </tr> |
| 680 | <tr> |
| 681 | <td>CVE-2015-3878</td> |
| 682 | <td><a href="https://android.googlesource.com/platform/frameworks/base/+/b3145760db5d58a107fd1ffd8eeec67d983d45f3">ANDROID-23345192</a></td> |
| 683 | <td>Moderate</td> |
| 684 | <td>5.0 - 6.0</td> |
| 685 | <td> Aug 18, 2015</td> |
| 686 | </tr> |
| 687 | </table> |
| 688 | |
| 689 | |
| 690 | <h3 id=elevation_of_privilege_vulnerability_in_bluetooth>Elevation of Privilege Vulnerability in Bluetooth</h3> |
| 691 | |
| 692 | |
| 693 | <p>A vulnerability in Android's Bluetooth component could allow an application to |
| 694 | delete stored SMS messages. This issue is rated as Moderate severity because it |
| 695 | can be used to improperly gain elevated permissions.</p> |
| 696 | <table> |
| 697 | <tr> |
| 698 | <th>CVE</th> |
| 699 | <th>Bug(s) with AOSP links</th> |
| 700 | <th>Severity</th> |
| 701 | <th>Affected versions</th> |
| 702 | <th>Date reported</th> |
| 703 | </tr> |
| 704 | <tr> |
| 705 | <td>CVE-2015-3847</td> |
| 706 | <td><a href="https://android.googlesource.com/platform%2Fpackages%2Fapps%2FBluetooth/+/19004c751f36aa2b01d3e03d4f761d8897542bd2">ANDROID-22343270</a></td> |
| 707 | <td>Moderate</td> |
| 708 | <td>5.1 and below</td> |
| 709 | <td>Jul 8, 2015</td> |
| 710 | </tr> |
| 711 | </table> |
| 712 | |
| 713 | |
| 714 | <h3 id=elevation_of_privilege_vulnerabilities_in_sqlite> |
| 715 | Elevation of Privilege Vulnerabilities in SQLite</h3> |
| 716 | |
| 717 | |
| 718 | <p>Multiple vulnerabilities were discovered in the SQLite parsing engine. These |
| 719 | vulnerabilities may be exploitable by a local application that can cause |
| 720 | another application or service to execute arbitrary SQL queries. Successful |
| 721 | exploitation could result in arbitrary code execution in the context of the |
| 722 | target application.</p> |
| 723 | |
| 724 | <p>A fix was uploaded to AOSP master on April 8, 2015, upgrading the SQLite |
| 725 | version to 3.8.9: <a href="https://android-review.googlesource.com/#/c/145961/">https://android-review.googlesource.com/#/c/145961/</a></p> |
| 726 | |
| 727 | <p>This bulletin contains patches for the SQLite versions in Android 4.4 (SQLite |
| 728 | 3.7.11) and Android 5.0 and 5.1 (SQLite 3.8.6).</p> |
| 729 | <table> |
| 730 | <tr> |
| 731 | <th>CVE</th> |
| 732 | <th>Bug(s) with AOSP links</th> |
| 733 | <th>Severity</th> |
| 734 | <th>Affected versions</th> |
| 735 | <th>Date reported</th> |
| 736 | </tr> |
| 737 | <tr> |
| 738 | <td>CVE-2015-6607</td> |
| 739 | <td><a href="https://android.googlesource.com/platform%2Fexternal%2Fsqlite/+/3fcd43a0f1ef02756029e12af3cb9ba9faa13364">ANDROID-20099586</a></td> |
| 740 | <td>Moderate</td> |
| 741 | <td> 5.1 and below</td> |
| 742 | <td>April 7, 2015<br />Publicly Known</td> |
| 743 | </tr> |
| 744 | </table> |
| 745 | |
| 746 | |
| 747 | <h3 id=denial_of_service_vulnerabilities_in_mediaserver> |
| 748 | Denial of Service Vulnerabilities in Mediaserver</h3> |
| 749 | |
| 750 | |
| 751 | <p>There are multiple vulnerabilities in mediaserver that can cause a Denial of |
| 752 | Service by crashing the mediaserver process. These issues are rated as Low |
| 753 | severity because the effect is experienced by a crash of the media server |
| 754 | resulting in a local temporary denial of service.</p> |
| 755 | <table> |
| 756 | <tr> |
| 757 | <th>CVE</th> |
| 758 | <th>Bug(s) with AOSP links</th> |
| 759 | <th>Severity</th> |
| 760 | <th>Affected versions</th> |
| 761 | <th>Date reported</th> |
| 762 | </tr> |
| 763 | <tr> |
| 764 | <td rowspan="3">CVE-2015-6605</td> |
| 765 | <td><a href="https://android.googlesource.com/platform%2Fexternal%2Ftremolo/+/36ec928f52271dd1feb4c86b18026564220629e9">ANDROID-20915134</a></td> |
| 766 | <td rowspan="2">Low</td> |
| 767 | <td rowspan="2">5.1 and below</td> |
| 768 | <td rowspan="2">Google Internal </td> |
| 769 | </tr> |
| 770 | <tr> |
| 771 | <td><a href="https://android.googlesource.com/platform%2Fframeworks%2Fav/+/3ce293842fed1b3abd2ff0aecd2a0c70a55086ee">ANDROID-23142203</a></td> |
| 772 | </tr> |
| 773 | <tr> |
| 774 | <td><a href="https://android.googlesource.com/platform%2Fexternal%2Flibhevc/+/2b67e532653b815e2341a0ac0b59d1b0ef82170d">ANDROID-22278703</a></td> |
| 775 | <td>Low</td> |
| 776 | <td>5.0 - 6.0</td> |
| 777 | <td>Google Internal</td> |
| 778 | </tr> |
| 779 | <tr> |
| 780 | <td>CVE-2015-3862</td> |
| 781 | <td><a href="https://android.googlesource.com/platform%2Fframeworks%2Fav/+/f26400c9d01a0e2f71690d5ebc644270f098d590">ANDROID-22954006</a></td> |
| 782 | <td>Low</td> |
| 783 | <td>5.1 and below</td> |
| 784 | <td>Aug 2, 2015</td> |
| 785 | </tr> |
| 786 | </table> |
| 787 | |
| 788 | |
| 789 | <h2 id=revisions>Revisions</h2> |
| 790 | |
| 791 | |
| 792 | <ul> |
| 793 | <li> October 05, 2015: Bulletin published. |
| 794 | <li> October 07, 2015: Bulletin updated with AOSP references. Clarified the bug |
| 795 | references for CVE-2014-9082. |
| 796 | <li> October 12, 2015: Updated acknowledgements for CVE-2015-3868, CVE-2015-3869, |
| 797 | CVE-2015-3865, CVE-2015-3862. |
| 798 | </ul> |