Danielle Roberts | 7bd5058 | 2015-12-21 18:43:36 -0800 | [diff] [blame] | 1 | page.title=Nexus Security Bulletin - January 2016 |
| 2 | @jd:body |
| 3 | |
| 4 | <!-- |
Danielle Roberts | d4d5b5b | 2016-01-05 17:16:48 -0800 | [diff] [blame] | 5 | Copyright 2016 The Android Open Source Project |
Danielle Roberts | 7bd5058 | 2015-12-21 18:43:36 -0800 | [diff] [blame] | 6 | |
| 7 | Licensed under the Apache License, Version 2.0 (the "License"); |
| 8 | you may not use this file except in compliance with the License. |
| 9 | You may obtain a copy of the License at |
| 10 | |
| 11 | http://www.apache.org/licenses/LICENSE-2.0 |
| 12 | |
| 13 | Unless required by applicable law or agreed to in writing, software |
| 14 | distributed under the License is distributed on an "AS IS" BASIS, |
| 15 | WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| 16 | See the License for the specific language governing permissions and |
| 17 | limitations under the License. |
| 18 | --> |
| 19 | <div id="qv-wrapper"> |
| 20 | <div id="qv"> |
| 21 | <h2>In this document</h2> |
| 22 | <ol id="auto-toc"> |
| 23 | </ol> |
| 24 | </div> |
| 25 | </div> |
| 26 | |
Danielle Roberts | d4d5b5b | 2016-01-05 17:16:48 -0800 | [diff] [blame] | 27 | <p><em>Published January 04, 2016 | Updated January 06, 2016</em></p> |
Danielle Roberts | 7bd5058 | 2015-12-21 18:43:36 -0800 | [diff] [blame] | 28 | |
| 29 | <p>We have released a security update to Nexus devices through an over-the-air |
| 30 | (OTA) update as part of our Android Security Bulletin Monthly Release process. |
| 31 | The Nexus firmware images have also been released to the <a href="https://developers.google.com/android/nexus/images">Google Developer site</a>. Builds LMY49F or later and Android 6.0 with Security Patch Level of January |
| 32 | 1, 2016 or later address these issues. Refer to the <a href="#common_questions_and_answers">Common Questions and Answers</a> section for more details.</p> |
| 33 | |
| 34 | <p>Partners were notified about and provided updates for the issues described in |
Danielle Roberts | d4d5b5b | 2016-01-05 17:16:48 -0800 | [diff] [blame] | 35 | this bulletin on December 7, 2015 or earlier. Where applicable, source code |
| 36 | patches for these issues have been released to the Android Open Source Project (AOSP) repository.</p> |
Danielle Roberts | 7bd5058 | 2015-12-21 18:43:36 -0800 | [diff] [blame] | 37 | |
| 38 | <p>The most severe of these issues is a Critical security vulnerability that could |
| 39 | enable remote code execution on an affected device through multiple methods |
| 40 | such as email, web browsing, and MMS when processing media files.</p> |
| 41 | |
| 42 | <p>We have had no reports of active customer exploitation of these newly reported |
| 43 | issues. Refer to the <a href="#mitigations">Mitigations</a> section for details on the <a href="https://source.android.com/security/enhancements/">Android security platform protections</a> and service protections such as SafetyNet, which improve the security of the |
| 44 | Android platform. We encourage all customers to accept these updates to their |
| 45 | devices.</p> |
| 46 | |
| 47 | <h2 id=security_vulnerability_summary>Security Vulnerability Summary</h2> |
| 48 | |
| 49 | |
| 50 | <p>The table below contains a list of security vulnerabilities, the Common |
| 51 | Vulnerability and Exposures ID (CVE), and their assessed severity. The <a href="https://source.android.com/security/overview/updates-resources.html#severity">severity assessment</a> is based on the effect that exploiting the vulnerability would have on an |
| 52 | affected device, assuming the platform and service mitigations are disabled for |
| 53 | development purposes or if successfully bypassed.</p> |
| 54 | <table> |
| 55 | <tr> |
| 56 | <th>Issue</th> |
| 57 | <th>CVE</th> |
| 58 | <th>Severity</th> |
| 59 | </tr> |
| 60 | <tr> |
| 61 | <td>Remote Code Execution Vulnerability in Mediaserver</td> |
| 62 | <td>CVE-2015-6636</td> |
| 63 | <td>Critical</td> |
| 64 | </tr> |
| 65 | <tr> |
| 66 | <td>Elevation of Privilege Vulnerability in misc-sd driver</td> |
| 67 | <td>CVE-2015-6637</td> |
| 68 | <td>Critical</td> |
| 69 | </tr> |
| 70 | <tr> |
| 71 | <td>Elevation of Privilege Vulnerability in the Imagination Technologies driver</td> |
| 72 | <td>CVE-2015-6638</td> |
| 73 | <td>Critical</td> |
| 74 | </tr> |
| 75 | <tr> |
| 76 | <td>Elevation of Privilege Vulnerabilities in Trustzone</td> |
| 77 | <td>CVE-2015-6639</td> |
| 78 | <td>Critical</td> |
| 79 | </tr> |
| 80 | <tr> |
| 81 | <td>Elevation of Privilege Vulnerability in Kernel</td> |
| 82 | <td>CVE-2015-6640</td> |
| 83 | <td>Critical</td> |
| 84 | </tr> |
| 85 | <tr> |
| 86 | <td>Elevation of Privilege Vulnerability in Bluetooth</td> |
| 87 | <td>CVE-2015-6641</td> |
| 88 | <td>High</td> |
| 89 | </tr> |
| 90 | <tr> |
| 91 | <td>Information Disclosure Vulnerability in Kernel</td> |
| 92 | <td>CVE-2015-6642</td> |
| 93 | <td>High</td> |
| 94 | </tr> |
| 95 | <tr> |
| 96 | <td>Elevation of Privilege Vulnerability in Setup Wizard</td> |
| 97 | <td>CVE-2015-6643</td> |
| 98 | <td>Moderate</td> |
| 99 | </tr> |
| 100 | <tr> |
| 101 | <td>Elevation of Privilege Vulnerability in Wi-Fi</td> |
| 102 | <td>CVE-2015-5310</td> |
| 103 | <td>Moderate</td> |
| 104 | </tr> |
| 105 | <tr> |
| 106 | <td>Information Disclosure Vulnerability in Bouncy Castle</td> |
| 107 | <td>CVE-2015-6644</td> |
| 108 | <td>Moderate</td> |
| 109 | </tr> |
| 110 | <tr> |
| 111 | <td>Denial of Service Vulnerability in SyncManager</td> |
| 112 | <td>CVE-2015-6645</td> |
| 113 | <td>Moderate</td> |
| 114 | </tr> |
| 115 | <tr> |
| 116 | <td>Attack Surface Reduction for Nexus Kernels</td> |
| 117 | <td>CVE-2015-6646</td> |
| 118 | <td>Moderate</td> |
| 119 | </tr> |
| 120 | </table> |
| 121 | |
| 122 | |
| 123 | <h2 id=mitigations>Mitigations</h2> |
| 124 | |
| 125 | |
| 126 | <p>This is a summary of the mitigations provided by the <a href="https://source.android.com/security/enhancements/index.html">Android security platform</a> and service protections such as SafetyNet. These capabilities reduce the |
| 127 | likelihood that security vulnerabilities could be successfully exploited on |
| 128 | Android.</p> |
| 129 | |
| 130 | <ul> |
| 131 | <li> Exploitation for many issues on Android is made more difficult by enhancements |
| 132 | in newer versions of the Android platform. We encourage all users to update to |
| 133 | the latest version of Android where possible. |
| 134 | <li> The Android Security team is actively monitoring for abuse with Verify Apps and |
| 135 | SafetyNet which will warn about potentially harmful applications about to be |
| 136 | installed. Device rooting tools are prohibited within Google Play. To protect |
| 137 | users who install applications from outside of Google Play, Verify Apps is |
| 138 | enabled by default and will warn users about known rooting applications. Verify |
| 139 | Apps attempts to identify and block installation of known malicious |
| 140 | applications that exploit a privilege escalation vulnerability. If such an |
| 141 | application has already been installed, Verify Apps will notify the user and |
| 142 | attempt to remove any such applications. |
| 143 | <li> As appropriate, Google Hangouts and Messenger applications do not automatically |
| 144 | pass media to processes such as mediaserver. |
| 145 | </ul> |
| 146 | |
| 147 | <h2 id=acknowledgements>Acknowledgements</h2> |
| 148 | |
| 149 | |
| 150 | <p>We would like to thank these researchers for their contributions:</p> |
| 151 | |
| 152 | <ul> |
| 153 | <li> Abhishek Arya, Oliver Chang, and Martin Barbella of Google Chrome Security |
| 154 | Team: CVE-2015-6636, CVE-2015-6617 |
| 155 | <li> Sen Nie (<a href="https://twitter.com/@nforest_">@nforest_</a>) and jfang of KEEN lab, Tencent (<a href="https://twitter.com/k33nteam">@K33nTeam</a>): CVE-2015-6637 |
| 156 | <li> Yabin Cui from Android Bionic Team: CVE-2015-6640 |
| 157 | <li> Tom Craig of Google X: CVE-2015-6641 |
| 158 | <li> Jann Horn (<a href="https://thejh.net">https://thejh.net</a>): CVE-2015-6642 |
| 159 | <li> Jouni Malinen PGP id EFC895FA: CVE-2015-5310 |
| 160 | <li> Quan Nguyen of Google Information Security Engineer Team: CVE-2015-6644 |
Danielle Roberts | d4d5b5b | 2016-01-05 17:16:48 -0800 | [diff] [blame] | 161 | <li> Gal Beniamini (<a href="https://twitter.com/@laginimaineb">@laginimaineb</a>, <a href="http://bits-please.blogspot.com">http://bits-please.blogspot.com</a>): CVE-2015-6639 |
Danielle Roberts | 7bd5058 | 2015-12-21 18:43:36 -0800 | [diff] [blame] | 162 | </ul> |
| 163 | |
| 164 | <h2 id=security_vulnerability_details>Security Vulnerability Details</h2> |
| 165 | |
| 166 | <p>In the sections below, we provide details for each of the security |
| 167 | vulnerabilities listed in the <a href="#security_vulnerability_summary">Security Vulnerability Summary</a> above. There is a description of the issue, a severity rationale, and a table |
| 168 | with the CVE, associated bug, severity, updated versions, and date reported. |
| 169 | When available, we will link the AOSP change that addressed the issue to the |
| 170 | bug ID. When multiple changes relate to a single bug, additional AOSP |
| 171 | references are linked to numbers following the bug ID. </p> |
| 172 | |
| 173 | <h3 id=remote_code_execution_vulnerability_in_mediaserver>Remote Code Execution Vulnerability in Mediaserver</h3> |
| 174 | |
| 175 | |
| 176 | <p>During media file and data processing of a specially crafted file, |
| 177 | vulnerabilities in mediaserver could allow an attacker to cause memory |
| 178 | corruption and remote code execution as the mediaserver process.</p> |
| 179 | |
| 180 | <p>The affected functionality is provided as a core part of the operating system |
| 181 | and there are multiple applications that allow it to be reached with remote |
| 182 | content, most notably MMS and browser playback of media.</p> |
| 183 | |
| 184 | <p>This issue is rated as a Critical severity due to the possibility of remote |
| 185 | code execution within the context of the mediaserver service. The mediaserver |
| 186 | service has access to audio and video streams as well as access to privileges |
| 187 | that third-party apps cannot normally access.</p> |
| 188 | <table> |
| 189 | <tr> |
| 190 | <th>CVE</th> |
Danielle Roberts | d4d5b5b | 2016-01-05 17:16:48 -0800 | [diff] [blame] | 191 | <th>Bug(s) with AOSP links</th> |
Danielle Roberts | 7bd5058 | 2015-12-21 18:43:36 -0800 | [diff] [blame] | 192 | <th>Severity</th> |
| 193 | <th>Updated versions</th> |
| 194 | <th>Date reported</th> |
| 195 | </tr> |
| 196 | <tr> |
| 197 | <td rowspan="2">CVE-2015-6636</td> |
Danielle Roberts | d4d5b5b | 2016-01-05 17:16:48 -0800 | [diff] [blame] | 198 | <td><a href="https://android.googlesource.com/platform%2Fexternal%2Flibhevc/+/b9f7c2c45c6fe770b7daffb9a4e61522d1f12d51#">ANDROID-25070493</a></td> |
Danielle Roberts | 7bd5058 | 2015-12-21 18:43:36 -0800 | [diff] [blame] | 199 | <td>Critical</td> |
| 200 | <td>5.0, 5.1.1, 6.0, 6.0.1</td> |
| 201 | <td>Google Internal</td> |
| 202 | </tr> |
| 203 | <tr> |
Danielle Roberts | d4d5b5b | 2016-01-05 17:16:48 -0800 | [diff] [blame] | 204 | <td><a href="https://android.googlesource.com/platform%2Fexternal%2Flibhevc/+/e8bfec1fa41eafa1fd8e05d0fdc53ea0f2379518">ANDROID-24686670</a></td> |
Danielle Roberts | 7bd5058 | 2015-12-21 18:43:36 -0800 | [diff] [blame] | 205 | <td>Critical</td> |
| 206 | <td>5.0, 5.1.1, 6.0, 6.0.1</td> |
| 207 | <td>Google Internal</td> |
| 208 | </tr> |
| 209 | </table> |
| 210 | |
| 211 | |
| 212 | <h3 id=elevation_of_privilege_vulnerability_in_misc-sd_driver>Elevation of Privilege Vulnerability in misc-sd driver</h3> |
| 213 | |
| 214 | |
| 215 | <p>An elevation of privilege vulnerability in the misc-sd driver from MediaTek |
| 216 | could enable a local malicious application to execute arbitrary code within the |
| 217 | kernel. This issue is rated as a Critical severity due to the possibility of a |
| 218 | local permanent device compromise, in which case the device would possibly need |
| 219 | to be repaired by re-flashing the operating system.</p> |
| 220 | <table> |
| 221 | <tr> |
| 222 | <th>CVE</th> |
Danielle Roberts | d4d5b5b | 2016-01-05 17:16:48 -0800 | [diff] [blame] | 223 | <th>Bug(s)</th> |
Danielle Roberts | 7bd5058 | 2015-12-21 18:43:36 -0800 | [diff] [blame] | 224 | <th>Severity</th> |
| 225 | <th>Updated versions</th> |
| 226 | <th>Date reported</th> |
| 227 | </tr> |
| 228 | <tr> |
| 229 | <td>CVE-2015-6637</td> |
Danielle Roberts | d4d5b5b | 2016-01-05 17:16:48 -0800 | [diff] [blame] | 230 | <td>ANDROID-25307013*</td> |
Danielle Roberts | 7bd5058 | 2015-12-21 18:43:36 -0800 | [diff] [blame] | 231 | <td>Critical</td> |
| 232 | <td>4.4.4, 5.0, 5.1.1, 6.0, 6.0.1</td> |
| 233 | <td>Oct 26, 2015</td> |
| 234 | </tr> |
| 235 | </table> |
| 236 | |
Danielle Roberts | d4d5b5b | 2016-01-05 17:16:48 -0800 | [diff] [blame] | 237 | <p> * The patch for this issue is not in AOSP. The update is contained in the |
| 238 | latest binary drivers for Nexus devices available from the <a href="https://developers.google.com/android/nexus/drivers">Google Developer site</a>.</p> |
Danielle Roberts | 7bd5058 | 2015-12-21 18:43:36 -0800 | [diff] [blame] | 239 | |
| 240 | <h3 id=elevation_of_privilege_vulnerability_in_the_imagination_technologies_driver>Elevation of Privilege Vulnerability in the Imagination Technologies driver</h3> |
| 241 | |
| 242 | |
| 243 | <p>An elevation of privilege vulnerability in a kernel driver from Imagination |
| 244 | Technologies could enable a local malicious application to execute arbitrary |
| 245 | code within the kernel. This issue is rated as a Critical severity due to the |
| 246 | possibility of a local permanent device compromise, in which case device would |
| 247 | possibly need to be repaired by re-flashing the operating system.</p> |
| 248 | <table> |
| 249 | <tr> |
| 250 | <th>CVE</th> |
Danielle Roberts | d4d5b5b | 2016-01-05 17:16:48 -0800 | [diff] [blame] | 251 | <th>Bug(s)</th> |
Danielle Roberts | 7bd5058 | 2015-12-21 18:43:36 -0800 | [diff] [blame] | 252 | <th>Severity</th> |
| 253 | <th>Updated versions</th> |
| 254 | <th>Date reported</th> |
| 255 | </tr> |
| 256 | <tr> |
| 257 | <td>CVE-2015-6638</td> |
Danielle Roberts | d4d5b5b | 2016-01-05 17:16:48 -0800 | [diff] [blame] | 258 | <td>ANDROID-24673908*</td> |
Danielle Roberts | 7bd5058 | 2015-12-21 18:43:36 -0800 | [diff] [blame] | 259 | <td>Critical</td> |
Danielle Roberts | 17648a1 | 2016-01-26 18:21:00 -0800 | [diff] [blame] | 260 | <td>5.0, 5.1.1, 6.0, 6.0.1</td> |
Danielle Roberts | 7bd5058 | 2015-12-21 18:43:36 -0800 | [diff] [blame] | 261 | <td>Google Internal</td> |
| 262 | </tr> |
| 263 | </table> |
| 264 | |
Danielle Roberts | d4d5b5b | 2016-01-05 17:16:48 -0800 | [diff] [blame] | 265 | <p> * The patch for this issue is not in AOSP. The update is contained in the |
| 266 | latest binary drivers for Nexus devices available from the <a href="https://developers.google.com/android/nexus/drivers">Google Developer site</a>.</p> |
Danielle Roberts | 7bd5058 | 2015-12-21 18:43:36 -0800 | [diff] [blame] | 267 | |
| 268 | <h3 id=elevation_of_privilege_vulnerabilities_in_trustzone>Elevation of Privilege Vulnerabilities in Trustzone</h3> |
| 269 | |
| 270 | |
| 271 | <p>Elevation of privilege vulnerabilities in the Widevine QSEE TrustZone |
| 272 | application could enable a compromise, privileged application with access to |
| 273 | QSEECOM to execute arbitrary code in the Trustzone context. This issue is rated |
| 274 | as a Critical severity due to the possibility of a local permanent device |
| 275 | compromise, in which case the device would possibly need to be repaired by |
| 276 | re-flashing the operating system.</p> |
| 277 | <table> |
| 278 | <tr> |
| 279 | <th>CVE</th> |
Danielle Roberts | d4d5b5b | 2016-01-05 17:16:48 -0800 | [diff] [blame] | 280 | <th>Bug(s)</th> |
Danielle Roberts | 7bd5058 | 2015-12-21 18:43:36 -0800 | [diff] [blame] | 281 | <th>Severity</th> |
| 282 | <th>Updated versions</th> |
| 283 | <th>Date reported</th> |
| 284 | </tr> |
| 285 | <tr> |
| 286 | <td>CVE-2015-6639</td> |
Danielle Roberts | d4d5b5b | 2016-01-05 17:16:48 -0800 | [diff] [blame] | 287 | <td>ANDROID-24446875*</td> |
Danielle Roberts | 7bd5058 | 2015-12-21 18:43:36 -0800 | [diff] [blame] | 288 | <td>Critical</td> |
| 289 | <td>5.0, 5.1.1, 6.0, 6.0.1</td> |
| 290 | <td>Sep 23, 2015</td> |
| 291 | </tr> |
| 292 | <tr> |
| 293 | <td>CVE-2015-6647</td> |
Danielle Roberts | d4d5b5b | 2016-01-05 17:16:48 -0800 | [diff] [blame] | 294 | <td>ANDROID-24441554*</td> |
Danielle Roberts | 7bd5058 | 2015-12-21 18:43:36 -0800 | [diff] [blame] | 295 | <td>Critical</td> |
| 296 | <td>5.0, 5.1.1, 6.0, 6.0.1</td> |
| 297 | <td>Sep 27, 2015</td> |
| 298 | </tr> |
| 299 | </table> |
| 300 | |
Danielle Roberts | d4d5b5b | 2016-01-05 17:16:48 -0800 | [diff] [blame] | 301 | <p> * The patch for this issue is not in AOSP. The update is contained in the |
| 302 | latest binary drivers for Nexus devices available from the <a href="https://developers.google.com/android/nexus/drivers">Google Developer site</a>.</p> |
Danielle Roberts | 7bd5058 | 2015-12-21 18:43:36 -0800 | [diff] [blame] | 303 | |
| 304 | <h3 id=elevation_of_privilege_vulnerability_in_kernel>Elevation of Privilege Vulnerability in Kernel</h3> |
| 305 | |
| 306 | |
| 307 | <p>An elevation of privilege vulnerability in the kernel could enable a local |
| 308 | malicious application to execute arbitrary code in the kernel. This issue is |
| 309 | rated as a Critical severity due to the possibility of a local permanent device |
| 310 | compromise, in which case the device would possibly need to be repaired by |
| 311 | re-flashing the operating system.</p> |
| 312 | <table> |
| 313 | <tr> |
| 314 | <th>CVE</th> |
| 315 | <th>Bug(s) with AOSP Link</th> |
| 316 | <th>Severity</th> |
| 317 | <th>Updated versions</th> |
| 318 | <th>Date reported</th> |
| 319 | </tr> |
| 320 | <tr> |
| 321 | <td>CVE-2015-6640</td> |
| 322 | <td><a href="https://android.googlesource.com/kernel%2Fcommon/+/69bfe2d957d903521d32324190c2754cb073be15">ANDROID-20017123</a></td> |
| 323 | <td>Critical</td> |
| 324 | <td>4.4.4, 5.0, 5.1.1, 6.0</td> |
| 325 | <td>Google Internal</td> |
| 326 | </tr> |
| 327 | </table> |
| 328 | |
| 329 | |
| 330 | <h3 id=elevation_of_privilege_vulnerability_in_bluetooth>Elevation of Privilege Vulnerability in Bluetooth</h3> |
| 331 | |
| 332 | |
| 333 | <p>An elevation of privilege vulnerability in the Bluetooth component could enable |
| 334 | a remote device paired over Bluetooth to gain access to user’s private |
| 335 | information (Contacts). This issue is rated as High severity because it could |
| 336 | be used to gain “<a href="http://developer.android.com/guide/topics/manifest/permission-element.html#plevel">dangerous</a>” capabilities remotely, these permissions are accessible only to third-party |
| 337 | applications installed locally.</p> |
| 338 | <table> |
| 339 | <tr> |
| 340 | <th>CVE</th> |
Danielle Roberts | d4d5b5b | 2016-01-05 17:16:48 -0800 | [diff] [blame] | 341 | <th>Bug(s) with AOSP links</th> |
Danielle Roberts | 7bd5058 | 2015-12-21 18:43:36 -0800 | [diff] [blame] | 342 | <th>Severity</th> |
| 343 | <th>Updated versions</th> |
| 344 | <th>Date reported</th> |
| 345 | </tr> |
| 346 | <tr> |
| 347 | <td>CVE-2015-6641</td> |
Danielle Roberts | d4d5b5b | 2016-01-05 17:16:48 -0800 | [diff] [blame] | 348 | <td><a href="https://android.googlesource.com/platform%2Fpackages%2Fapps%2FSettings/+/98f11fd1a4752beed56b5fe7a4097ec0ae0c74b3">ANDROID-23607427</a> [<a href="https://android.googlesource.com/platform%2Fframeworks%2Fbase/+/ccbe7383e63d7d23bac6bccc8e4094fe474645ec">2</a>]</td> |
Danielle Roberts | 7bd5058 | 2015-12-21 18:43:36 -0800 | [diff] [blame] | 349 | <td>High</td> |
| 350 | <td>6.0, 6.0.1</td> |
| 351 | <td>Google Internal</td> |
| 352 | </tr> |
| 353 | </table> |
| 354 | |
| 355 | |
| 356 | <h3 id=information_disclosure_vulnerability_in_kernel>Information Disclosure Vulnerability in Kernel</h3> |
| 357 | |
| 358 | |
| 359 | <p>An information disclosure vulnerability in the kernel could permit a bypass of |
| 360 | security measures in place to increase the difficulty of attackers exploiting |
| 361 | the platform. These issues are rated as High severity because they could also |
| 362 | be used to gain elevated capabilities, such as <a href="http://developer.android.com/guide/topics/manifest/permission-element.html#plevel">Signature</a> or <a href="http://developer.android.com/guide/topics/manifest/permission-element.html#plevel">SignatureOrSystem</a> permissions privileges, which are not accessible to third-party applications.</p> |
| 363 | <table> |
| 364 | <tr> |
| 365 | <th>CVE</th> |
Danielle Roberts | d4d5b5b | 2016-01-05 17:16:48 -0800 | [diff] [blame] | 366 | <th>Bug(s)</th> |
Danielle Roberts | 7bd5058 | 2015-12-21 18:43:36 -0800 | [diff] [blame] | 367 | <th>Severity</th> |
| 368 | <th>Updated versions</th> |
| 369 | <th>Date reported</th> |
| 370 | </tr> |
| 371 | <tr> |
| 372 | <td>CVE-2015-6642</td> |
Danielle Roberts | d4d5b5b | 2016-01-05 17:16:48 -0800 | [diff] [blame] | 373 | <td>ANDROID-24157888*</td> |
Danielle Roberts | 7bd5058 | 2015-12-21 18:43:36 -0800 | [diff] [blame] | 374 | <td>High</td> |
| 375 | <td>4.4.4, 5.0, 5.1.1, 6.0</td> |
| 376 | <td>Sep 12, 2015</td> |
| 377 | </tr> |
| 378 | </table> |
Danielle Roberts | d4d5b5b | 2016-01-05 17:16:48 -0800 | [diff] [blame] | 379 | <p> * The patch for this issue is not in AOSP. The update is contained in the |
| 380 | latest binary drivers for Nexus devices available from the <a href="https://developers.google.com/android/nexus/drivers">Google Developer site</a>.</p> |
Danielle Roberts | 7bd5058 | 2015-12-21 18:43:36 -0800 | [diff] [blame] | 381 | |
| 382 | <h3 id=elevation_of_privilege_vulnerability_in_setup_wizard>Elevation of Privilege Vulnerability in Setup Wizard</h3> |
| 383 | |
| 384 | |
| 385 | <p>An elevation of privilege vulnerability in the Setup Wizard could enable an |
| 386 | attacker with physical access to the device to gain access to device settings |
| 387 | and perform a manual device reset. This issue is rated as Moderate severity |
| 388 | because it could be used to improperly work around the factory reset |
| 389 | protection.</p> |
| 390 | <table> |
| 391 | <tr> |
| 392 | <th>CVE</th> |
Danielle Roberts | d4d5b5b | 2016-01-05 17:16:48 -0800 | [diff] [blame] | 393 | <th>Bug(s) with AOSP links</th> |
Danielle Roberts | 7bd5058 | 2015-12-21 18:43:36 -0800 | [diff] [blame] | 394 | <th>Severity</th> |
| 395 | <th>Updated versions</th> |
| 396 | <th>Date reported</th> |
| 397 | </tr> |
| 398 | <tr> |
| 399 | <td>CVE-2015-6643</td> |
Danielle Roberts | d4d5b5b | 2016-01-05 17:16:48 -0800 | [diff] [blame] | 400 | <td><a href="https://android.googlesource.com/platform/packages/apps/Settings/+/665ac7bc29396fd5af2ecfdfda2b9de7a507daa0">ANDROID-25290269</a> [<a href="https://android.googlesource.com/platform/packages/apps/Settings/+/a7ff2e955d2509ed28deeef984347e093794f92b">2</a>]</td> |
Danielle Roberts | 7bd5058 | 2015-12-21 18:43:36 -0800 | [diff] [blame] | 401 | <td>Moderate</td> |
| 402 | <td>5.1.1, 6.0, 6.0.1</td> |
| 403 | <td>Google Internal</td> |
| 404 | </tr> |
| 405 | </table> |
| 406 | |
| 407 | |
| 408 | <h3 id=elevation_of_privilege_vulnerability_in_wi-fi>Elevation of Privilege Vulnerability in Wi-Fi</h3> |
| 409 | |
| 410 | |
| 411 | <p>An elevation of privilege vulnerability in the Wi-Fi component could enable a |
| 412 | locally proximate attacker to gain access to Wi-Fi service related information. |
| 413 | A device is only vulnerable to this issue while in local proximity. This issue |
| 414 | is rated as Moderate severity because it could be used to gain “<a href="http://developer.android.com/guide/topics/manifest/permission-element.html#plevel">normal</a>” capabilities remotely, these permissions are accessible only to third-party |
| 415 | applications installed locally.</p> |
| 416 | <table> |
| 417 | <tr> |
| 418 | <th>CVE</th> |
Danielle Roberts | d4d5b5b | 2016-01-05 17:16:48 -0800 | [diff] [blame] | 419 | <th>Bug(s) with AOSP links</th> |
Danielle Roberts | 7bd5058 | 2015-12-21 18:43:36 -0800 | [diff] [blame] | 420 | <th>Severity</th> |
| 421 | <th>Updated versions</th> |
| 422 | <th>Date reported</th> |
| 423 | </tr> |
| 424 | <tr> |
| 425 | <td>CVE-2015-5310</td> |
Danielle Roberts | d4d5b5b | 2016-01-05 17:16:48 -0800 | [diff] [blame] | 426 | <td><a href="https://android.googlesource.com/platform%2Fexternal%2Fwpa_supplicant_8/+/1e9857b5f1dd84ac5a0ada0150b1b9c87d44d99d">ANDROID-25266660</a></td> |
Danielle Roberts | 7bd5058 | 2015-12-21 18:43:36 -0800 | [diff] [blame] | 427 | <td>Moderate</td> |
| 428 | <td>4.4.4, 5.0, 5.1.1, 6.0, 6.0.1</td> |
| 429 | <td>Oct 25, 2015</td> |
| 430 | </tr> |
| 431 | </table> |
| 432 | |
| 433 | |
| 434 | <h3 id=information_disclosure_vulnerability_in_bouncy_castle>Information Disclosure Vulnerability in Bouncy Castle</h3> |
| 435 | |
| 436 | |
| 437 | <p>An information disclosure vulnerability in Bouncy Castle could enable a local |
| 438 | malicious application to gain access to user’s private information. This issue |
| 439 | is rated as Moderate severity because it could be used to improperly gain “<a href="http://developer.android.com/guide/topics/manifest/permission-element.html#plevel">dangerous</a>” permissions.</p> |
| 440 | <table> |
| 441 | <tr> |
| 442 | <th>CVE</th> |
Danielle Roberts | d4d5b5b | 2016-01-05 17:16:48 -0800 | [diff] [blame] | 443 | <th>Bug(s) with AOSP links</th> |
Danielle Roberts | 7bd5058 | 2015-12-21 18:43:36 -0800 | [diff] [blame] | 444 | <th>Severity</th> |
| 445 | <th>Updated versions</th> |
| 446 | <th>Date reported</th> |
| 447 | </tr> |
| 448 | <tr> |
| 449 | <td>CVE-2015-6644</td> |
Danielle Roberts | d4d5b5b | 2016-01-05 17:16:48 -0800 | [diff] [blame] | 450 | <td><a href="https://android.googlesource.com/platform/external/bouncycastle/+/3e128c5fea3a0ca2d372aa09c4fd4bb0eadfbd3f">ANDROID-24106146</a></td> |
Danielle Roberts | 7bd5058 | 2015-12-21 18:43:36 -0800 | [diff] [blame] | 451 | <td>Moderate</td> |
| 452 | <td>4.4.4, 5.0, 5.1.1, 6.0, 6.0.1</td> |
| 453 | <td>Google Internal</td> |
| 454 | </tr> |
| 455 | </table> |
| 456 | |
| 457 | |
| 458 | <h3 id=denial_of_service_vulnerability_in_syncmanager>Denial of Service Vulnerability in SyncManager</h3> |
| 459 | |
| 460 | |
| 461 | <p>A denial of service vulnerability in the SyncManager could enable a local |
| 462 | malicious application to cause a reboot loop. This issue is rated as Moderate |
| 463 | severity because it could be used to cause a local temporary denial of service |
| 464 | that would possibly need to be fixed though a factory reset.</p> |
| 465 | <table> |
| 466 | <tr> |
| 467 | <th>CVE</th> |
Danielle Roberts | d4d5b5b | 2016-01-05 17:16:48 -0800 | [diff] [blame] | 468 | <th>Bug(s) with AOSP links</th> |
Danielle Roberts | 7bd5058 | 2015-12-21 18:43:36 -0800 | [diff] [blame] | 469 | <th>Severity</th> |
| 470 | <th>Updated versions</th> |
| 471 | <th>Date reported</th> |
| 472 | </tr> |
| 473 | <tr> |
| 474 | <td>CVE-2015-6645</td> |
Danielle Roberts | d4d5b5b | 2016-01-05 17:16:48 -0800 | [diff] [blame] | 475 | <td><a href="https://android.googlesource.com/platform%2Fframeworks%2Fbase/+/c0f39c1ece72a05c796f7ba30b7a2b5b580d5025">ANDROID-23591205</a></td> |
Danielle Roberts | 7bd5058 | 2015-12-21 18:43:36 -0800 | [diff] [blame] | 476 | <td>Moderate</td> |
| 477 | <td>4.4.4, 5.0, 5.1.1, 6.0</td> |
| 478 | <td>Google Internal</td> |
| 479 | </tr> |
| 480 | </table> |
| 481 | |
| 482 | |
| 483 | <h3 id=attack_surface_reduction_for_nexus_kernels>Attack Surface Reduction for Nexus Kernels</h3> |
| 484 | |
| 485 | |
| 486 | <p>SysV IPC is not supported in any Android Kernel. We have removed this from the |
| 487 | OS as it exposes additional attack surface that doesn’t add functionality to |
| 488 | the system that could be exploited by malicious applications. Also, System V |
| 489 | IPCs are not compliant with Android's application lifecycle because the |
| 490 | allocated resources are not freeable by the memory manager leading to global |
| 491 | kernel resource leakage. This change addresses issue such as CVE-2015-7613.</p> |
| 492 | <table> |
| 493 | <tr> |
| 494 | <th>CVE</th> |
Danielle Roberts | d4d5b5b | 2016-01-05 17:16:48 -0800 | [diff] [blame] | 495 | <th>Bug(s)</th> |
Danielle Roberts | 7bd5058 | 2015-12-21 18:43:36 -0800 | [diff] [blame] | 496 | <th>Severity</th> |
| 497 | <th>Updated versions</th> |
| 498 | <th>Date reported</th> |
| 499 | </tr> |
| 500 | <tr> |
| 501 | <td>CVE-2015-6646</td> |
Danielle Roberts | d4d5b5b | 2016-01-05 17:16:48 -0800 | [diff] [blame] | 502 | <td>ANDROID-22300191*</td> |
Danielle Roberts | 7bd5058 | 2015-12-21 18:43:36 -0800 | [diff] [blame] | 503 | <td>Moderate</td> |
| 504 | <td>6.0</td> |
| 505 | <td>Google Internal</td> |
| 506 | </tr> |
| 507 | </table> |
| 508 | |
Danielle Roberts | d4d5b5b | 2016-01-05 17:16:48 -0800 | [diff] [blame] | 509 | <p> * The patch for this issue is not in AOSP. The update is contained in the |
| 510 | latest binary drivers for Nexus devices available from the <a href="https://developers.google.com/android/nexus/drivers">Google Developer site</a>.</p> |
Danielle Roberts | 7bd5058 | 2015-12-21 18:43:36 -0800 | [diff] [blame] | 511 | |
| 512 | <h3 id=common_questions_and_answers>Common Questions and Answers</h3> |
| 513 | |
| 514 | |
| 515 | <p>This section reviews answers to common questions that may occur after reading |
| 516 | this bulletin.</p> |
| 517 | |
| 518 | <p><strong>1. How do I determine if my device is updated to address these issues? </strong></p> |
| 519 | |
| 520 | <p>Builds LMY49F or later and Android 6.0 with Security Patch Level of January 1, |
| 521 | 2016 or later address these issues. Refer to the <a href="https://support.google.com/nexus/answer/4457705">Nexus documentation</a> for instructions on how to check the security patch level. Device |
| 522 | manufacturers that include these updates should set the patch string level to: |
| 523 | [ro.build.version.security_patch]:[2016-01-01] </p> |
| 524 | |
| 525 | <h2 id=revisions>Revisions</h2> |
| 526 | |
| 527 | |
| 528 | <ul> |
| 529 | <li> January 04, 2016: Bulletin published. |
Danielle Roberts | d4d5b5b | 2016-01-05 17:16:48 -0800 | [diff] [blame] | 530 | <li> January 06, 2016: Bulletin revised to include AOSP links. |