Lucian Constantin
CSO Senior Writer

Google fixes over 100 flaws in Android, many in chipset drivers

news
Jul 7, 20163 mins

Manufacturers can choose between two patch levels, one dedicated to device-specific fixes

Google released a new batch of Android patches on Wednesday, fixing over 100 flaws in Android’s own components and in chipset-specific drivers from different manufacturers.

Android’s mediaserver component, which handles the processing of video and audio streams and has been a source of many vulnerabilities in the past, is at the forefront of this security update. It accounts for 16 Android vulnerabilities, including 7 critical flaws that can allow an attacker to execute code with higher privileges. 

The bugs can be exploited by sending specifically crafted audio or video files to users’ devices via the browser, email, or messaging apps. Because of the repeated mediaserver flaws, Google Hangouts and the default Android Messenger applications no longer pass media to this component automatically.

Another critical vulnerability was fixed in the OpenSSL and BoringSSL crypto libraries that are bundled with the Android OS. This flaw can also be exploited through a specially crafted file to execute code within the context of the affected processes.

This month’s security bulletin was split into two parts: one with patches that apply to all Android devices, and one with patches that apply only to devices that contain the affected chipset drivers.

Phone manufacturers will have the option to upgrade their phones to one of two patch levels: 2016-07-01, which includes device-agnostic fixes, and 2016-07-05, which includes the 2016-07-01 fixes plus the device-specific ones.

The patch level, expressed as a date string, is displayed in Android’s settings under “About phone” and indicates that the firmware contains all Android security patches up to that date. It only exists in newer versions of Android.

The 2016-07-01 patch level includes fixes for 32 vulnerabilities: 8 rated critical, 15 of high severity and 9 moderate.

The 2016-07-05 security patch level includes additional fixes for a whooping 75 vulnerabilities that are marked as device-specific. Twelve of these vulnerabilities are rated critical and are located in highly privileged components such as the Qualcomm GPU driver, the MediaTek Wi-Fi driver, the Qualcomm performance component, the NVIDIA video driver, the kernel file system, the USB driver and other unspecified MediaTek drivers.

Because these drivers are loaded inside the kernel, the most privileged area of the operating system, the vulnerabilities can lead to a permanent device compromise that can only be fixed by reflashing the firmware.

Most of the other 54 high-severity flaws were also in various chipset drivers and can also lead to a complete device compromise. The difference is that the attacker needs to already have access to a privileged process in order to exploit them.

As usual, Google released firmware updates for all of its supported Nexus devices and will release the patches to the Android Open Source Project (AOSP) over the next 48 hours. Manufacturers and carriers that are Google’s partners were notified about the patches included in this bulletin on June 6 or earlier.

Lucian Constantin

Lucian Constantin writes about information security, privacy, and data protection for CSO. Before joining CSO in 2019, Lucian was a freelance writer for VICE Motherboard, Security Boulevard, Forbes, and The New Stack. Earlier in his career, he was an information security correspondent for the IDG News Service and Information security news editor for Softpedia.

Before he became a journalist, Lucian worked as a system and network administrator. He enjoys attending security conferences and delving into interesting research papers. He lives and works in Romania.

You can reach him at lucian_constantin@foundryco.com or @lconstantin on X. For encrypted email, his PGP key's fingerprint is: 7A66 4901 5CDA 844E 8C6D 04D5 2BB4 6332 FC52 6D42

More from this author