Google’s July Security Patch is Now Rolling Out OTA – Download Factory Images Here

AndroidMarshmallow_10

Google has begun rolling out the July security patch for Android devices. The first devices to receive the update are, as always, Nexus devices, so below we’ve listed all the appropriate download links for the factory images (thanks to 9to5Google) depending on which device you own. Keep in mind that flashing one of these images will erase all data on your device.

According to the July security bulletin, there’s two different lists of bugs found and fixed for this month’s patch. One is labeled 2016-07-01 and contains 22 bug fixes, while the other is named 2016-07-05 and lists 32 device specific bugs and security flaws. According to Google, the reason for two lists this month is to provide “Android partners with the flexibility to move more quickly to fix a subset of vulnerabilities that are similar across all Android devices.” Of course each individual Android device runs different software which could contain any number of flaws, so this new double list strategy makes plenty of sense.

Here’s a full list of all the bugs fixed in the list labeled 2016-07-01 as a part of the July security patch.

Issue CVE Severity Affects Nexus?
Remote code execution vulnerability in Mediaserver CVE-2016-2506, CVE-2016-2505, CVE-2016-2507, CVE-2016-2508, CVE-2016-3741, CVE-2016-3742, CVE-2016-3743 Critical Yes
Remote code execution vulnerability in OpenSSL & BoringSSL CVE-2016-2108 Critical Yes
Remote code execution vulnerability in Bluetooth CVE-2016-3744 High Yes
Elevation of privilege vulnerability in libpng CVE-2016-3751 High Yes
Elevation of privilege vulnerability in Mediaserver CVE-2016-3745, CVE-2016-3746, CVE-2016-3747 High Yes
Elevation of privilege vulnerability in sockets CVE-2016-3748 High Yes
Elevation of privilege vulnerability in LockSettingsService CVE-2016-3749 High Yes
Elevation of privilege vulnerability in Framework APIs CVE-2016-3750 High Yes
Elevation of privilege vulnerability in ChooserTarget service CVE-2016-3752 High Yes
Information disclosure vulnerability in Mediaserver CVE-2016-3753 High No*
Information disclosure vulnerability in OpenSSL CVE-2016-2107 High No*
Denial of service vulnerability in Mediaserver CVE-2016-3754, CVE-2016-3755, CVE-2016-3756 High Yes
Denial of service vulnerability in libc CVE-2016-3818 High No*
Elevation of privilege vulnerability in lsof CVE-2016-3757 Moderate Yes
Elevation of privilege vulnerability in DexClassLoader CVE-2016-3758 Moderate Yes
Elevation of privilege vulnerability in Framework APIs CVE-2016-3759 Moderate Yes
Elevation of privilege vulnerability in Bluetooth CVE-2016-3760 Moderate Yes
Elevation of privilege vulnerability in NFC CVE-2016-3761 Moderate Yes
Elevation of privilege vulnerability in sockets CVE-2016-3762 Moderate Yes
Information disclosure vulnerability in Proxy Auto-Config CVE-2016-3763 Moderate Yes
Information disclosure vulnerability in Mediaserver CVE-2016-3764, CVE-2016-3765 Moderate Yes
Denial of service vulnerability in Mediaserver CVE-2016-3766 Moderate Yes

And here’s all the bugs resolved as a part of the list labeled 2016-07-05.

Issue CVE Severity Affects Nexus?
Elevation of privilege vulnerability in Qualcomm GPU driver (Device specific) CVE-2016-2503, CVE-2016-2067 Critical Yes
Elevation of privilege vulnerability in MediaTek Wi-Fi driver (Device specific) CVE-2016-3767 Critical Yes
Elevation of privilege vulnerability in Qualcomm performance component (Device specific) CVE-2016-3768 Critical Yes
Elevation of privilege vulnerability in NVIDIA video driver (Device specific) CVE-2016-3769 Critical Yes
Elevation of privilege vulnerability in MediaTek drivers (Device specific) CVE-2016-3770, CVE-2016-3771, CVE-2016-3772, CVE-2016-3773, CVE-2016-3774 Critical Yes
Elevation of privilege vulnerability in kernel file system (Device specific) CVE-2016-3775 Critical Yes
Elevation of privilege vulnerability in USB driver (Device specific) CVE-2015-8816 Critical Yes
Elevation of privilege vulnerability in Qualcomm components (Device specific) CVE-2014-9794, CVE-2014-9795, CVE-2015-8892, CVE-2013-7457, CVE-2014-9781, CVE-2014-9786, CVE-2014-9788, CVE-2014-9779, CVE-2014-9780, CVE-2014-9789, CVE-2014-9793, CVE-2014-9782, CVE-2014-9783, CVE-2014-9785, CVE-2014-9787, CVE-2014-9784, CVE-2014-9777, CVE-2014-9778, CVE-2014-9790, CVE-2014-9792, CVE-2014-9797, CVE-2014-9791, CVE-2014-9796, CVE-2014-9800, CVE-2014-9799, CVE-2014-9801, CVE-2014-9802, CVE-2015-8891, CVE-2015-8888, CVE-2015-8889, CVE-2015-8890 High Yes
Elevation of privilege vulnerability in Qualcomm USB driver (Device specific) CVE-2016-2502 High Yes
Elevation of privilege vulnerability in Qualcomm Wi-Fi driver (Device specific) CVE-2016-3792 High Yes
Elevation of privilege vulnerability in Qualcomm camera driver (Device specific) CVE-2016-2501 High Yes
Elevation of privilege vulnerability in NVIDIA camera driver (Device specific) CVE-2016-3793, CVE-2016-3794 High Yes
Elevation of privilege vulnerability in MediaTek power driver (Device specific) CVE-2016-3795, CVE-2016-3796 High Yes
Elevation of privilege vulnerability in Qualcomm Wi-Fi driver (Device specific) CVE-2016-3797 High Yes
Elevation of privilege vulnerability in MediaTek hardware sensor driver (Device specific) CVE-2016-3798 High Yes
Elevation of privilege vulnerability in MediaTek video driver (Device specific) CVE-2016-3799, CVE-2016-3800 High Yes
Elevation of privilege vulnerability in MediaTek GPS driver (Device specific) CVE-2016-3801 High Yes
Elevation of privilege vulnerability in kernel file system (Device specific) CVE-2016-3802, CVE-2016-3803 High Yes
Elevation of privilege vulnerability in MediaTek power management driver (Device specific) CVE-2016-3804, CVE-2016-3805 High Yes
Elevation of privilege vulnerability in MediaTek display driver (Device specific) CVE-2016-3806 High Yes
Elevation of privilege vulnerability in serial peripheral interface driver (Device specific) CVE-2016-3807, CVE-2016-3808 High Yes
Elevation of privilege vulnerability in Qualcomm sound driver (Device specific) CVE-2016-2068 High Yes
Elevation of privilege vulnerability in kernel (Device specific) CVE-2014-9803 High Yes
Information disclosure vulnerability in networking component (Device specific) CVE-2016-3809 High Yes
Information disclosure vulnerability in MediaTek Wi-Fi driver (Device specific) CVE-2016-3810 High Yes
Elevation of privilege vulnerability in kernel video driver (Device specific) CVE-2016-3811 Moderate Yes
Information disclosure vulnerability in MediaTek video codec driver (Device specific) CVE-2016-3812 Moderate Yes
Information disclosure vulnerability in Qualcomm USB driver (Device specific) CVE-2016-3813 Moderate Yes
Information disclosure vulnerability in NVIDIA camera driver (Device specific) CVE-2016-3814, CVE-2016-3815 Moderate Yes
Information disclosure vulnerability in MediaTek display driver (Device specific) CVE-2016-3816 Moderate Yes
Information disclosure vulnerability in kernel teletype driver (Device specific) CVE-2016-0723 Moderate Yes
Denial of service vulnerability in Qualcomm bootloader (Device specific) CVE-2014-9798, CVE-2015-8893 Moderate Yes

The most sever of these bugs happens to be one which could enable remote code execution when browsing or using email and MMS on a Nexus device or any other Android-powered handset or tablet.

In about a week, this update should begin rolling out to Android devices everywhere. If you don’t wanna wait, download one of the faculty images linked above and follow Google’s official guide on how to flash these images to your devices (seen below).

Flashing Instructions

To flash a device using one of the system images below (or one of your own), you need the latest fastboot tool. You can get it from one of the sources below.

Once you have the fastboot tool, add it to your PATH environment variable (the flash-all script below must be able to find it). Also be certain that you’ve set up USB access for your device, as described in the Using Hardware Devicesguide.

Caution: Flashing a new system image deletes all user data. Be certain to first backup any personal data such as photos.

To flash a system image:

  1. Download the appropriate system image for your device below, then unzip it to a safe directory.
  2. Connect your device to your computer over USB.
  3. Start the device in fastboot mode with one of the following methods:
    • Using the adb tool: With the device powered on, execute: adb reboot bootloader
    • Using a key combo: Turn the device off, then turn it on and immediately hold down the relevant key combination for your device. For example, to put a Nexus 5 (“hammerhead”) into fastboot mode, press and hold Volume Up + Volume Down + Power as the device begins booting up.
  4. If necessary, unlock the device’s bootloader by running: fastboot flashing unlock
    or, for older devices, running:
    fastboot oem unlock
    The target device will show you a confirmation screen. (This erases all data on the target device.)
  5. Open a terminal and navigate to the unzipped system image directory.
  6. Execute the flash-all script. This script installs the necessary bootloader, baseband firmware(s), and operating system.

Once the script finishes, your device reboots. You should now lock the bootloader for security:

  1. Start the device in fastboot mode again, as described above.
  2. Execute: fastboot flashing lock
    or, for older devices, running:
    fastboot oem lock

Locking bootloader will wipe the data on some devices. After locking the bootloader, if you want to flash the device again, you must run fastboot oem unlock again, which will wipe the data.


Source: Android Security Bulletin via 9to5Google




There are 2 comments

Add yours

This site uses Akismet to reduce spam. Learn how your comment data is processed.

%d bloggers like this: