Android Security Bulletin_January 2019_Latest Updates

Android Security Bulletin_January 2019_Latest Updates

Android and Google service mitigations
This is a summary of the mitigations provided by the Android security platform and service protections such as Google Play Protect. These capabilities reduce the likelihood that security vulnerabilities could be successfully exploited on Android.

Exploitation for many issues on Android is made more difficult by enhancements in newer versions of the Android platform. We encourage all users to update to the latest version of Android where possible.
The Android security team actively monitors for abuse through Google Play Protect and warns users about Potentially Harmful Applications. Google Play Protect is enabled by default on devices with Google Mobile Services, and is especially important for users who install apps from outside of Google Play.

2019-01-01 security patch level vulnerability details


In the sections below, we provide details for each of the security vulnerabilities that apply to the 2019-01-01 patch level. Vulnerabilities are grouped under the component they affect. There is a description of the issue and a table with the CVE, associated references, type of vulnerability, severity, and updated AOSP versions (where applicable). When available, we link the public change that addressed the issue to the bug ID, such as the AOSP change list. When multiple changes relate to a single bug, additional references are linked to numbers following the bug ID.

 

Framework

The most severe vulnerability in this section could enable a local malicious application to bypass user interaction requirements in order to gain access to additional permissions.

CVE References Type Severity Updated AOSP versions
CVE-2018-9582 A-112031362 EoP High 8.0, 8.1, 9

System

The most severe vulnerability in this section could enable a remote attacker using a specially crafted file to execute arbitrary code within the context of a privileged process.

CVE References Type Severity Updated AOSP versions
CVE-2018-9583 A-112860487 RCE Critical 7.0, 7.1.1, 7.1.2, 8.0, 8.1, 9
CVE-2018-9584 A-114047681 EoP High 7.0, 7.1.1, 7.1.2, 8.0, 8.1, 9
CVE-2018-9585 A-117554809 EoP High 7.0, 7.1.1, 7.1.2, 8.0, 8.1, 9
CVE-2018-9586 A-116754444 EoP High 7.0, 7.1.1, 7.1.2, 8.0, 8.1, 9
CVE-2018-9587 A-113597344 EoP High 7.0, 7.1.1, 7.1.2, 8.0, 8.1, 9
CVE-2018-9588 A-111450156 ID High 7.0, 7.1.1, 7.1.2, 8.0, 8.1, 9
CVE-2018-9589 A-111893132 ID High 7.0, 7.1.1, 7.1.2, 8.0, 8.1, 9
CVE-2018-9590 A-115900043 ID High 7.0, 7.1.1, 7.1.2, 8.0, 8.1, 9
CVE-2018-9591 A-116108738 ID High 7.0, 7.1.1, 7.1.2, 8.0, 8.1, 9
CVE-2018-9592 A-116319076 ID High 7.0, 7.1.1, 7.1.2, 8.0, 8.1, 9
CVE-2018-9593 A-116722267 ID High 7.0, 7.1.1, 7.1.2, 8.0, 8.1, 9
CVE-2018-9594 A-116791157 ID High 7.0, 7.1.1, 7.1.2, 8.0, 8.1, 9

2019-01-05 security patch level vulnerability details

In the sections below, we provide details for each of the security vulnerabilities that apply to the 2019-01-05 patch level. Vulnerabilities are grouped under the component they affect and include details such as the CVE, associated references, type of vulnerability, severity, component (where applicable), and updated AOSP versions (where applicable). When available, we link the public change that addressed the issue to the bug ID, such as the AOSP change list. When multiple changes relate to a single bug, additional references are linked to numbers following the bug ID.

Kernel components

The most severe vulnerability in this section could enable a local malicious application to execute arbitrary code within the context of a privileged process.

CVE References Type Severity Component
CVE-2018-10876 A-116406122
Upstream kernel
EoP High ext4 filesystem
CVE-2018-10880 A-116406509
Upstream kernel
EoP High ext4 filesystem
CVE-2018-10882 A-116406626
Upstream kernel
EoP High ext4 filesystem
CVE-2018-13405 A-113452403
Upstream kernel
EoP High Filesystem
CVE-2018-18281 A-118836219
Upstream kernel
EoP High TLB
CVE-2018-17182 A-117280327
Upstream kernel
EoP High Memory Manager
CVE-2018-10877 A-116406625
Upstream kernel
ID High ext4 filesystem

NVIDIA components

The most severe vulnerability in this section could enable a local malicious application to execute arbitrary code within the context of a privileged process.

CVE References Type Severity Component
CVE-2018-6241 A-62540032* EoP High Dragon BSP

Qualcomm components

These vulnerabilities affect Qualcomm components and are described in further detail in the appropriate Qualcomm security bulletin or security alert. The severity assessment of these issues is provided directly by Qualcomm.

CVE References Type Severity Component
CVE-2018-11962 A-117118292
QC-CR#2267916
N/A High Audio
CVE-2018-12014 A-117118062
QC-CR#2278688
N/A High Data HLOS - LNX
CVE-2018-13889 A-117118677
QC-CR#2288358
N/A High GPS

Qualcomm closed-source components

These vulnerabilities affect Qualcomm components and are described in further detail in the appropriate Qualcomm security bulletin or security alert. The severity assessment of these issues is provided directly by Qualcomm.

CVE References Type Severity Component
CVE-2018-11847 A-111092812* N/A Critical Closed-source component
CVE-2018-11888 A-111093241* N/A High Closed-source component
CVE-2018-13888 A-117119136* N/A High Closed-source component

Leave a comment