Android patches fix Drammer RAM attack, but not Dirty Cow exploit

The security patches address 12 critical vulnerabilities in various Android components and drivers

Google released a new monthly batch of security patches for Android, fixing a dozen critical vulnerabilities that could allow attackers to compromise devices. One of the mitigated issues is a bit-flipping attack against memory chips that could lead to privilege escalation, but a more widespread rooting vulnerability in the Linux kernel remains unpatched.

While Google releases firmware updates for its Nexus and Pixel devices on the first Monday of every month, the security patches are shared with third-party device manufacturers one month in advance and are also contributed later to the Android Open Source Project to benefit the entire ecosystem.

Like it has done in recent months, Google has split this month's security fixes into several "security patch levels," to make it easier for manufacturers to deploy only fixes that apply to specific devices. The security patch level is a date string displayed in Android's settings under "About phone" and indicates that the firmware contains all Android security patches up to that date.

The new 2016-11-01 patch level contains fixes for flaws in Android's own components. It addresses two critical vulnerabilities, 16 high-risk flaws and 10 medium-risk ones.

One of the critical flaws is located in the Mediaserver component, which has been a major source of serious Android vulnerabilities over the past year. The flaw can be exploited by tricking users into downloading or opening a specially crafted media file.

The second critical flaw is located in the libzipfile library and could enable malicious applications to execute code within the context of a privileged process. This can lead to a full device compromise that requires reflashing the operating system to fix.

The second patch level is 2016-11-05 and primarily includes fixes for vulnerabilities in kernel drivers for various hardware components. This level covers 21 critical vulnerabilities, 23 high-risk ones and 10 with a moderate impact.

The critical flaws are located in the kernel file system, SCSI driver, media driver, USB driver, ION subsystem, networking subsystem and sound subsystem, as well as in the Nvidia GPU driver and Qualcomm's crypto driver, bootloader and other components.

One of the patches for the ION memory allocator is intended to mitigate a physical attack against DRAM (dynamic random-access memory) chips that could be exploited by applications to gain root access on a device. The attack is known as Drammer and was devised by researchers from the Vrije Universiteit Amsterdam in the Netherlands, the Graz University of Technology in Austria, and the University of California in Santa Barbara.

The third patch level is 2016-11-06 and covers a privilege escalation vulnerability in the memory subsystem of the Linux kernel that was disclosed a few weeks ago. The flaw, which the security community dubbed Dirty COW (copy-on-write) has existed in the Linux kernel for the past nine years and is already being exploited in the wild.

Google has not patched this vulnerability in its Nexus and Pixel devices yet and will probably do it next month. However, device manufacturers can address the flaw by importing the upstream fix that was included in the Linux kernels versions 3.10 and 3.18. The flaw was disclosed after this month's patch levels had already been defined, which is why Google refers to the 2016-11-06 patch level as "supplemental."

Join the PC World newsletter!

Error: Please check your email address.

Our Back to Business guide highlights the best products for you to boost your productivity at home, on the road, at the office, or in the classroom.

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Lucian Constantin

IDG News Service
Show Comments

Most Popular Reviews

Latest News Articles

Resources

PCW Evaluation Team

Azadeh Williams

HP OfficeJet Pro 8730

A smarter way to print for busy small business owners, combining speedy printing with scanning and copying, making it easier to produce high quality documents and images at a touch of a button.

Andrew Grant

HP OfficeJet Pro 8730

I've had a multifunction printer in the office going on 10 years now. It was a neat bit of kit back in the day -- print, copy, scan, fax -- when printing over WiFi felt a bit like magic. It’s seen better days though and an upgrade’s well overdue. This HP OfficeJet Pro 8730 looks like it ticks all the same boxes: print, copy, scan, and fax. (Really? Does anyone fax anything any more? I guess it's good to know the facility’s there, just in case.) Printing over WiFi is more-or- less standard these days.

Ed Dawson

HP OfficeJet Pro 8730

As a freelance writer who is always on the go, I like my technology to be both efficient and effective so I can do my job well. The HP OfficeJet Pro 8730 Inkjet Printer ticks all the boxes in terms of form factor, performance and user interface.

Michael Hargreaves

Windows 10 for Business / Dell XPS 13

I’d happily recommend this touchscreen laptop and Windows 10 as a great way to get serious work done at a desk or on the road.

Aysha Strobbe

Windows 10 / HP Spectre x360

Ultimately, I think the Windows 10 environment is excellent for me as it caters for so many different uses. The inclusion of the Xbox app is also great for when you need some downtime too!

Mark Escubio

Windows 10 / Lenovo Yoga 910

For me, the Xbox Play Anywhere is a great new feature as it allows you to play your current Xbox games with higher resolutions and better graphics without forking out extra cash for another copy. Although available titles are still scarce, but I’m sure it will grow in time.

Featured Content

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?