| <html devsite> |
| <head> |
| <title>Pixel / Nexus Security Bulletin—August 2018</title> |
| <meta name="project_path" value="/_project.yaml" /> |
| <meta name="book_path" value="/_book.yaml" /> |
| </head> |
| <body> |
| <!-- |
| Copyright 2018 The Android Open Source Project |
| |
| Licensed under the Apache License, Version 2.0 (the "License"); |
| you may not use this file except in compliance with the License. |
| You may obtain a copy of the License at |
| |
| //www.apache.org/licenses/LICENSE-2.0 |
| |
| Unless required by applicable law or agreed to in writing, software |
| distributed under the License is distributed on an "AS IS" BASIS, |
| WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| See the License for the specific language governing permissions and |
| limitations under the License. |
| --> |
| |
| <p><em>Published August 6, 2018</em></p> |
| |
| <p> |
| The Pixel / Nexus Security Bulletin contains details of security |
| vulnerabilities and functional improvements affecting <a |
| href="https://support.google.com/pixelphone/answer/4457705#pixel_phones&nexus_devices" |
| class="external">supported Google Pixel and Nexus devices</a> (Google devices). |
| For Google devices, security patch levels of 2018-08-05 or later address all |
| issues in this bulletin and all issues in the August 2018 Android Security |
| Bulletin. To learn how to check a device's security patch level, see <a |
| href="https://support.google.com/pixelphone/answer/4457705" |
| class="external">Check & update your Android version</a>. |
| </p> |
| <p> |
| All supported Google devices will receive an update to the 2018-08-05 patch |
| level. We encourage all customers to accept these updates to their devices. |
| </p> |
| <p class="note"> |
| <strong>Note:</strong> The Google device firmware images are available on the |
| <a href="https://developers.google.com/android/images" class="external">Google |
| Developer site</a>. |
| </p> |
| |
| <h2 id="announcements">Announcements</h2> |
| <p>In addition to the security vulnerabilities described in the August 2018 |
| Android Security Bulletin, Google devices also contain patches for the |
| security vulnerabilities described below. Partners were notified of these |
| issues at least a month ago and may choose to incorporate them as part of their |
| device updates.</p> |
| |
| <h2 id="security-patches">Security patches</h2> |
| <p> |
| Vulnerabilities are grouped under the component that they affect. There is a |
| description of the issue and a table with the CVE, associated references, |
| <a href="#type">type of vulnerability</a>, |
| <a href="/security/overview/updates-resources.html#severity">severity</a>, |
| and updated Android Open Source Project (AOSP) versions (where applicable). |
| When available, we link the public change that addressed the issue to the bug |
| ID, such as the AOSP change list. When multiple changes relate to a single bug, |
| additional references are linked to numbers following the bug ID. |
| </p> |
| |
| <h3 id="framework">Framework</h3> |
| |
| <table> |
| <col width="21%"> |
| <col width="21%"> |
| <col width="14%"> |
| <col width="14%"> |
| <col width="30%"> |
| <tr> |
| <th>CVE</th> |
| <th>References</th> |
| <th>Type</th> |
| <th>Severity</th> |
| <th>Updated AOSP versions</th> |
| </tr> |
| <tr> |
| <td>CVE-2017-1000100</td> |
| <td> |
| <a href="https://android.googlesource.com/platform/external/curl/+/1506c0316973bd95d7832891b1aa2258b52a793d">A-64610131</a> |
| </td> |
| <td>ID</td> |
| <td>Moderate</td> |
| <td>7.0, 7.1.1, 7.1.2, 8.0, 8.1</td> |
| </tr> |
| </table> |
| |
| |
| <h3 id="system">System</h3> |
| |
| <table> |
| <col width="21%"> |
| <col width="21%"> |
| <col width="14%"> |
| <col width="14%"> |
| <col width="30%"> |
| <tr> |
| <th>CVE</th> |
| <th>References</th> |
| <th>Type</th> |
| <th>Severity</th> |
| <th>Updated AOSP versions</th> |
| </tr> |
| <tr> |
| <td>CVE-2018-9435</td> |
| <td> |
| <a href="https://android.googlesource.com/platform/system/bt/+/51b05b715024adff4fa59ab2e18c0b56c5d3af5e">A-79591688</a> |
| </td> |
| <td>ID</td> |
| <td>Moderate</td> |
| <td>6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0, 8.1</td> |
| </tr> |
| <tr> |
| <td>CVE-2018-9461</td> |
| <td> |
| <a href="https://android.googlesource.com/platform/packages/apps/Messaging/+/17a2579a0aa603a3a7d94e5dc64afeb96e430e8f">A-37629504</a> |
| </td> |
| <td>ID</td> |
| <td>Moderate</td> |
| <td>6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0, 8.1</td> |
| </tr> |
| <tr> |
| <td>CVE-2018-9449</td> |
| <td> |
| <a href="https://android.googlesource.com/platform/system/bt/+/27b90f4f6fe3811335e9bb4fac4656bc1df49204">A-79884292</a> |
| </td> |
| <td>ID</td> |
| <td>Moderate</td> |
| <td>6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0, 8.1</td> |
| </tr> |
| <tr> |
| <td>CVE-2018-9457</td> |
| <td> |
| <a href="https://android.googlesource.com/platform/packages/apps/Settings/+/a3e94449c8fe0a377b61747b6129fafc930da086">A-72872376</a> |
| </td> |
| <td>ID</td> |
| <td>Moderate</td> |
| <td>6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0, 8.1</td> |
| </tr> |
| <tr> |
| <td>CVE-2018-9441</td> |
| <td> |
| <a href="https://android.googlesource.com/platform/system/bt/+/c3c69bed0f76178c640dd8e726967b9cdea5dece">A-74075873</a> |
| [<a href="https://android.googlesource.com/platform/system/bt/+/3a2799939b2da543ed3a62f29db658cb05f8ad3b">2</a>] |
| </td> |
| <td>ID</td> |
| <td>Moderate</td> |
| <td>6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0, 8.1</td> |
| </tr> |
| <tr> |
| <td>CVE-2017-13322</td> |
| <td> |
| <a href="https://android.googlesource.com/platform/packages/services/Telephony/+/c25745addd19b1549b7ec5bdc46d8bf1a1de37ed">A-67862398</a> |
| </td> |
| <td>DoS</td> |
| <td>Moderate</td> |
| <td>6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0, 8.1</td> |
| </tr> |
| <tr> |
| <td>CVE-2018-9447</td> |
| <td> |
| <a href="https://android.googlesource.com/platform/packages/services/Telephony/+/19c48992b79df89c730f3619eb69baf03d449e95">A-79995313</a> |
| </td> |
| <td>DoS</td> |
| <td>Moderate</td> |
| <td>6.0, 6.0.1, 8.0, 8.1</td> |
| </tr> |
| </table> |
| |
| |
| <h3 id="kernel-components">Kernel components</h3> |
| |
| <table> |
| <col width="21%"> |
| <col width="21%"> |
| <col width="14%"> |
| <col width="14%"> |
| <col width="30%"> |
| <tr> |
| <th>CVE</th> |
| <th>References</th> |
| <th>Type</th> |
| <th>Severity</th> |
| <th>Component</th> |
| </tr> |
| <tr> |
| <td>CVE-2018-9462</td> |
| <td>A-78364203<a href="#asterisk">*</a></td> |
| <td>EoP</td> |
| <td>Moderate</td> |
| <td>Touchscreen</td> |
| </tr> |
| <tr> |
| <td>CVE-2018-9439</td> |
| <td>A-79377438<a href="#asterisk">*</a></td> |
| <td>EoP</td> |
| <td>Moderate</td> |
| <td>Network stack</td> |
| </tr> |
| <tr> |
| <td>CVE-2018-9463</td> |
| <td>A-78362414<a href="#asterisk">*</a></td> |
| <td>EoP</td> |
| <td>Moderate</td> |
| <td>Touchscreen</td> |
| </tr> |
| <tr> |
| <td>CVE-2018-1068</td> |
| <td>A-77902350<br /> |
| <a |
| href="https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b71812168571fa55e44cdd0254471331b9c4c4c6"> |
| Upstream kernel</a></td> |
| <td>EoP</td> |
| <td>Moderate</td> |
| <td>Netfilter</td> |
| </tr> |
| <tr> |
| <td>CVE-2018-9464</td> |
| <td>A-68993267<a href="#asterisk">*</a></td> |
| <td>EoP</td> |
| <td>Moderate</td> |
| <td>Taimen bootloader</td> |
| </tr> |
| </table> |
| |
| |
| <h3 id="qualcomm-components">Qualcomm components</h3> |
| |
| <table> |
| <col width="21%"> |
| <col width="21%"> |
| <col width="14%"> |
| <col width="14%"> |
| <col width="30%"> |
| <tr> |
| <th>CVE</th> |
| <th>References</th> |
| <th>Type</th> |
| <th>Severity</th> |
| <th>Component</th> |
| </tr> |
| <tr> |
| <td>CVE-2018-11263</td> |
| <td>A-79422278<a href="#asterisk">*</a><br /> |
| QC-CR#2209106</td> |
| <td>EoP</td> |
| <td>Moderate</td> |
| <td>WLAN</td> |
| </tr> |
| <tr> |
| <td>CVE-2017-8261</td> |
| <td>A-35139833<a href="#asterisk">*</a><br /> |
| QC-CR#2013631</td> |
| <td>EoP</td> |
| <td>Moderate</td> |
| <td>Camera driver</td> |
| </tr> |
| <tr> |
| <td>CVE-2018-5910</td> |
| <td>A-79422277<br /> |
| <a href="https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=b67e04e3696f05411b7434c8b194895d273b00c5"> |
| QC-CR#2175499</a> |
| [<a href="https://source.codeaurora.org/quic/la/kernel/msm-4.4/commit/?id=d9344c2f4b60cf5d4c747c11f3cb0b6f1558db78">2</a>] |
| </td> |
| <td>EoP</td> |
| <td>Moderate</td> |
| <td>MDSS</td> |
| </tr> |
| <tr> |
| <td>CVE-2018-5909</td> |
| <td>A-79421262<br /> |
| <a |
| href="https://source.codeaurora.org/quic/la/kernel/msm-4.4/commit/?id=2c1716c5afd660651724b6088f2e6301272f4926"> |
| QC-CR#2174716</a></td> |
| <td>EoP</td> |
| <td>Moderate</td> |
| <td>Rotator</td> |
| </tr> |
| <tr> |
| <td>CVE-2018-5908</td> |
| <td>A-79422409<br /> |
| <a href="https://source.codeaurora.org/quic/la/kernel/msm-3.18/commit/?id=28e5918c60b832091c6b3618747258803cbd3302"> |
| QC-CR#2171758</a> |
| [<a href="https://source.codeaurora.org/quic/la/kernel/msm-4.4/commit/?id=4689d03e5db548d263232c274bf307956207da27">2</a>] |
| </td> |
| <td>EoP</td> |
| <td>Moderate</td> |
| <td>MDSS</td> |
| </tr> |
| <tr> |
| <td>CVE-2018-5905</td> |
| <td>A-79421261<br /> |
| <a |
| href="https://source.codeaurora.org/quic/la/kernel/msm-4.4/commit/?id=6eb2f4f6fde1b210712d6ac66b40b9e7684d77db"> |
| QC-CR#2169715</a></td> |
| <td>EoP</td> |
| <td>Moderate</td> |
| <td>Diag driver</td> |
| </tr> |
| <tr> |
| <td>CVE-2018-5904</td> |
| <td>A-79421260<br /> |
| <a href="https://source.codeaurora.org/quic/la/kernel/msm-4.4/commit/?id=88b838c8952ec6414c72449ae15768d15d2606dd"> |
| QC-CR#2184702</a> |
| [<a href="https://source.codeaurora.org/quic/la/kernel/msm-4.9/commit/?id=8e82c0d84ccee87309fd22f8208915f0ba502b26">2</a>] |
| </td> |
| <td>EoP</td> |
| <td>Moderate</td> |
| <td>Power driver</td> |
| </tr> |
| <tr> |
| <td>CVE-2018-5903</td> |
| <td>A-79421737<br /> |
| <a href="https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=20365fa599f42f6e1f175d9d5d60d964927c2160"> |
| QC-CR#2185477</a></td> |
| <td>EoP</td> |
| <td>Moderate</td> |
| <td>qcacld 3.0</td> |
| </tr> |
| <tr> |
| <td>CVE-2017-18306</td> |
| <td>A-73889358<a href="#asterisk">*</a><br /> |
| QC-CR#2216399</td> |
| <td>ID</td> |
| <td>Moderate</td> |
| <td>v4l2</td> |
| </tr> |
| <tr> |
| <td>CVE-2017-18307</td> |
| <td>A-73888283<a href="#asterisk">*</a><br /> |
| QC-CR#2026045</td> |
| <td>ID</td> |
| <td>Moderate</td> |
| <td>qcacld-3.0</td> |
| </tr> |
| <tr> |
| <td>CVE-2017-9711</td> |
| <td>A-36367253<a href="#asterisk">*</a><br /> |
| QC-CR#2046006</td> |
| <td>EoP</td> |
| <td>Moderate</td> |
| <td>IPA</td> |
| </tr> |
| <tr> |
| <td>CVE-2018-3587</td> |
| <td>A-65542521<a href="#asterisk">*</a><br /> |
| QC-CR#2120605</td> |
| <td>EoP</td> |
| <td>Moderate</td> |
| <td>qcacld-2.0</td> |
| </tr> |
| </table> |
| |
| |
| <h3 id="update:-framework">Update: Framework</h3> |
| |
| <table> |
| <col width="21%"> |
| <col width="21%"> |
| <col width="14%"> |
| <col width="14%"> |
| <col width="30%"> |
| <tr> |
| <th>CVE</th> |
| <th>References</th> |
| <th>Type</th> |
| <th>Severity</th> |
| <th>Updated AOSP versions</th> |
| </tr> |
| <tr> |
| <td>CVE-2017-13295</td> |
| <td> |
| <a href="https://android.googlesource.com/platform/frameworks/base/+/da24aa45a8b65a7b9adbe12ff94bf891bdd38825">A-62537081</a> |
| [<a href="https://android.googlesource.com/platform/packages/apps/PackageInstaller/+/3af01bd93513d902dbb5382b10109fdf3ab29d2d">2</a>] |
| </td> |
| <td>DoS</td> |
| <td>Moderate</td> |
| <td>6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0, 8.1</td> |
| </tr> |
| </table> |
| |
| |
| <h3 id="update:-system">Update: System</h3> |
| |
| <table> |
| <col width="21%"> |
| <col width="21%"> |
| <col width="14%"> |
| <col width="14%"> |
| <col width="30%"> |
| <tr> |
| <th>CVE</th> |
| <th>References</th> |
| <th>Type</th> |
| <th>Severity</th> |
| <th>Updated AOSP versions</th> |
| </tr> |
| <tr> |
| <td>CVE-2017-13242</td> |
| <td> |
| <a href="https://android.googlesource.com/platform/packages/apps/Settings/+/f973e707f50adc0c21599e719be06714f808a333">A-62672248</a> |
| </td> |
| <td>ID</td> |
| <td>Moderate</td> |
| <td>6.0, 6.0.1, 7.0, 7.1.1, 7.1.2, 8.0, 8.1</td> |
| </tr> |
| </table> |
| |
| |
| <h3 id="update:-qualcomm-components">Update: Qualcomm components</h3> |
| |
| <table> |
| <col width="21%"> |
| <col width="21%"> |
| <col width="14%"> |
| <col width="14%"> |
| <col width="30%"> |
| <tr> |
| <th>CVE</th> |
| <th>References</th> |
| <th>Type</th> |
| <th>Severity</th> |
| <th>Component</th> |
| </tr> |
| <tr> |
| <td>CVE-2017-15817</td> |
| <td>A-68992394<br /> |
| <a href="https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/prima/commit/?id=fe43c2b64ac81199de17efc258e95546cb0546f1">QC-CR#2076603</a> |
| [<a href="https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/prima/commit/?id=8ba78e506e5002cdae525dd544dbf1df0ccce1ef">2</a>] |
| <br> |
| <a href="https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=343a3f28338788c5c91289f53171c1f71f293cd7">QC-CR#2084599</a> |
| <br> |
| <a href="https://source.codeaurora.org/quic/la/platform/vendor/qcom-opensource/wlan/qcacld-3.0/commit/?id=0c21aaa2fefa6c5919813fdd287436dddda54227">QC-CR#2096512</a> |
| </td> |
| <td>RCE</td> |
| <td>Critical</td> |
| <td>WLAN</td> |
| </tr> |
| </table> |
| |
| |
| <h2 id="common-questions-and-answers">Common questions and answers</h2> |
| <p> |
| This section answers common questions that may occur after reading this |
| bulletin. |
| </p> |
| <p> |
| <strong>1. How do I determine if my device is updated to address these issues? |
| </strong> |
| </p> |
| <p> |
| Security patch levels of 2018-08-05 or later address all issues associated with |
| the 2018-08-05 security patch level and all previous patch levels. To learn how |
| to check a device's security patch level, read the instructions on the <a |
| href="https://support.google.com/pixelphone/answer/4457705#pixel_phones&nexus_devices" |
| class="external">Pixel and Nexus update schedule</a>. |
| </p> |
| <p id="type"> |
| <strong>2. What do the entries in the <em>Type</em> column mean?</strong> |
| </p> |
| <p> |
| Entries in the <em>Type</em> column of the vulnerability details table reference |
| the classification of the security vulnerability. |
| </p> |
| <table> |
| <col width="25%"> |
| <col width="75%"> |
| <tr> |
| <th>Abbreviation</th> |
| <th>Definition</th> |
| </tr> |
| <tr> |
| <td>RCE</td> |
| <td>Remote code execution</td> |
| </tr> |
| <tr> |
| <td>EoP</td> |
| <td>Elevation of privilege</td> |
| </tr> |
| <tr> |
| <td>ID</td> |
| <td>Information disclosure</td> |
| </tr> |
| <tr> |
| <td>DoS</td> |
| <td>Denial of service</td> |
| </tr> |
| <tr> |
| <td>N/A</td> |
| <td>Classification not available</td> |
| </tr> |
| </table> |
| <p> |
| <strong>3. What do the entries in the <em>References</em> column mean?</strong> |
| </p> |
| <p> |
| Entries under the <em>References</em> column of the vulnerability details table |
| may contain a prefix identifying the organization to which the reference value |
| belongs. |
| </p> |
| <table> |
| <col width="25%"> |
| <col width="75%"> |
| <tr> |
| <th>Prefix</th> |
| <th>Reference</th> |
| </tr> |
| <tr> |
| <td>A-</td> |
| <td>Android bug ID</td> |
| </tr> |
| <tr> |
| <td>QC-</td> |
| <td>Qualcomm reference number</td> |
| </tr> |
| <tr> |
| <td>M-</td> |
| <td>MediaTek reference number</td> |
| </tr> |
| <tr> |
| <td>N-</td> |
| <td>NVIDIA reference number</td> |
| </tr> |
| <tr> |
| <td>B-</td> |
| <td>Broadcom reference number</td> |
| </tr> |
| </table> |
| <p id="asterisk"> |
| <strong>4. What does a * next to the Android bug ID in the <em>References</em> |
| column mean?</strong> |
| </p> |
| <p> |
| Issues that are not publicly available have a * next to the Android bug ID in |
| the <em>References</em> column. The update for that issue is generally contained |
| in the latest binary drivers for Pixel / Nexus devices available |
| from the <a href="https://developers.google.com/android/nexus/drivers" |
| class="external">Google Developer site</a>. |
| </p> |
| <p> |
| <strong>5. Why are security vulnerabilities split between this bulletin and the |
| Android Security Bulletins?</strong> |
| </p> |
| <p> |
| Security vulnerabilities that are documented in the Android Security Bulletins |
| are required in order to declare the latest security patch level on Android |
| devices. Additional security vulnerabilities, such as those documented in this |
| bulletin are not required for declaring a security patch level. |
| </p> |
| <h2 id="versions">Versions</h2> |
| <table> |
| <col width="25%"> |
| <col width="25%"> |
| <col width="50%"> |
| <tr> |
| <th>Version</th> |
| <th>Date</th> |
| <th>Notes</th> |
| </tr> |
| <tr> |
| <td>1.0</td> |
| <td>August 6, 2018</td> |
| <td>Bulletin published.</td> |
| </tr> |
| </table> |
| </body> |
| </html> |