{"id":178095,"date":"2016-06-07T15:33:35","date_gmt":"2016-06-07T13:33:35","guid":{"rendered":"http:\/\/www.borncity.com\/blog\/?p=178095"},"modified":"2024-10-04T11:36:24","modified_gmt":"2024-10-04T09:36:24","slug":"android-juni-2016-update-fr-nexus-gerte","status":"publish","type":"post","link":"https:\/\/borncity.com\/blog\/2016\/06\/07\/android-juni-2016-update-fr-nexus-gerte\/","title":{"rendered":"Android Juni 2016-Update f&uuml;r Nexus-Ger&auml;te"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline;\" src=\"https:\/\/borncity.com\/blog\/wp-content\/uploads\/2012\/07\/android.jpg\" width=\"58\" height=\"58\" align=\"left\" \/>Auch im Juni 2016 bessert Google bei Android mit einem Sicherheits-Update f\u00fcr seine (noch unterst\u00fctzten) Nexus-Ger\u00e4te nach. Hier ein paar Informationen, was es zu wissen gibt.<\/p>\n<p><!--more--><\/p>\n<p>Die Ank\u00fcndigung des Updates findet sich auf der Google-Seite <a href=\"https:\/\/source.android.com\/security\/bulletin\/2016-06-01.html\" target=\"_blank\" rel=\"noopener\">Android Security Bulletin\u2014June 2016<\/a> vom 6. Juni 2016. Hier eine \u00dcbersicht der gefixten Sicherheitsl\u00fccken (Security Patch Levels of June 01, 2016).<\/p>\n<table>\n<colgroup>\n<col width=\"55%\" \/>\n<col width=\"20%\" \/>\n<col width=\"13%\" \/>\n<col width=\"12%\" \/><\/colgroup>\n<tbody>\n<tr>\n<th>Issue<\/th>\n<th>CVE<\/th>\n<th>Severity<\/th>\n<th>Affects Nexus?<\/th>\n<\/tr>\n<tr>\n<td>Remote Code Execution Vulnerability in Mediaserver<\/td>\n<td>CVE-2016-2463<\/td>\n<td>Critical<\/td>\n<td>Yes<\/td>\n<\/tr>\n<tr>\n<td>Remote Code Execution Vulnerabilities in libwebm<\/td>\n<td>CVE-2016-2464<\/td>\n<td>Critical<\/td>\n<td>Yes<\/td>\n<\/tr>\n<tr>\n<td>Elevation of Privilege Vulnerability in Qualcomm Video Driver<\/td>\n<td>CVE-2016-2465<\/td>\n<td>Critical<\/td>\n<td>Yes<\/td>\n<\/tr>\n<tr>\n<td>Elevation of Privilege Vulnerability in Qualcomm Sound Driver<\/td>\n<td>CVE-2016-2466<br \/>\nCVE-2016-2467<\/td>\n<td>Critical<\/td>\n<td>Yes<\/td>\n<\/tr>\n<tr>\n<td>Elevation of Privilege Vulnerability in Qualcomm GPU Driver<\/td>\n<td>CVE-2016-2468<br \/>\nCVE-2016-2062<\/td>\n<td>Critical<\/td>\n<td>Yes<\/td>\n<\/tr>\n<tr>\n<td>Elevation of Privilege Vulnerability in Qualcomm Wi-Fi Driver<\/td>\n<td>CVE-2016-2474<\/td>\n<td>Critical<\/td>\n<td>Yes<\/td>\n<\/tr>\n<tr>\n<td>Elevation of Privilege Vulnerability in Broadcom Wi-Fi Driver<\/td>\n<td>CVE-2016-2475<\/td>\n<td>High<\/td>\n<td>Yes<\/td>\n<\/tr>\n<tr>\n<td>Elevation of Privilege Vulnerability in Qualcomm Sound Driver<\/td>\n<td>CVE-2016-2066<br \/>\nCVE-2016-2469<\/td>\n<td>High<\/td>\n<td>Yes<\/td>\n<\/tr>\n<tr>\n<td>Elevation of Privilege Vulnerability in Mediaserver<\/td>\n<td>CVE-2016-2476<br \/>\nCVE-2016-2477<br \/>\nCVE-2016-2478<br \/>\nCVE-2016-2479<br \/>\nCVE-2016-2480<br \/>\nCVE-2016-2481<br \/>\nCVE-2016-2482<br \/>\nCVE-2016-2483<br \/>\nCVE-2016-2484<br \/>\nCVE-2016-2485<br \/>\nCVE-2016-2486<br \/>\nCVE-2016-2487<\/td>\n<td>High<\/td>\n<td>Yes<\/td>\n<\/tr>\n<tr>\n<td>Elevation of Privilege Vulnerability in Qualcomm Camera Driver<\/td>\n<td>CVE-2016-2061<br \/>\nCVE-2016-2488<\/td>\n<td>High<\/td>\n<td>Yes<\/td>\n<\/tr>\n<tr>\n<td>Elevation of Privilege Vulnerability in Qualcomm Video Driver<\/td>\n<td>CVE-2016-2489<\/td>\n<td>High<\/td>\n<td>Yes<\/td>\n<\/tr>\n<tr>\n<td>Elevation of Privilege Vulnerability in NVIDIA Camera Driver<\/td>\n<td>CVE-2016-2490<br \/>\nCVE-2016-2491<\/td>\n<td>High<\/td>\n<td>Yes<\/td>\n<\/tr>\n<tr>\n<td>Elevation of Privilege Vulnerability in Qualcomm Wi-Fi Driver<\/td>\n<td>CVE-2016-2470<br \/>\nCVE-2016-2471<br \/>\nCVE-2016-2472<br \/>\nCVE-2016-2473<\/td>\n<td>High<\/td>\n<td>Yes<\/td>\n<\/tr>\n<tr>\n<td>Elevation of Privilege Vulnerability in MediaTek Power Management Driver<\/td>\n<td>CVE-2016-2492<\/td>\n<td>High<\/td>\n<td>Yes<\/td>\n<\/tr>\n<tr>\n<td>Elevation of Privilege Vulnerability in SD Card Emulation Layer<\/td>\n<td>CVE-2016-2494<\/td>\n<td>High<\/td>\n<td>Yes<\/td>\n<\/tr>\n<tr>\n<td>Elevation of Privilege Vulnerability in Broadcom Wi-Fi Driver<\/td>\n<td>CVE-2016-2493<\/td>\n<td>High<\/td>\n<td>Yes<\/td>\n<\/tr>\n<tr>\n<td>Remote Denial of Service Vulnerability in Mediaserver<\/td>\n<td>CVE-2016-2495<\/td>\n<td>High<\/td>\n<td>Yes<\/td>\n<\/tr>\n<tr>\n<td>Elevation of Privilege Vulnerability in Framework UI<\/td>\n<td>CVE-2016-2496<\/td>\n<td>Moderate<\/td>\n<td>Yes<\/td>\n<\/tr>\n<tr>\n<td>Information Disclosure Vulnerability in Qualcomm Wi-Fi Driver<\/td>\n<td>CVE-2016-2498<\/td>\n<td>Moderate<\/td>\n<td>Yes<\/td>\n<\/tr>\n<tr>\n<td>Information Disclosure Vulnerability in Mediaserver<\/td>\n<td>CVE-2016-2499<\/td>\n<td>Moderate<\/td>\n<td>Yes<\/td>\n<\/tr>\n<tr>\n<td>Information Disclosure Vulnerability in Activity Manager<\/td>\n<td>CVE-2016-2500<\/td>\n<td>Moderate<\/td>\n<td>Yes<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Beim Media Server scheint man Stagefright-L\u00fccken gefixt zu haben. Wie immer wird Google das Sicherheits-Update in Wellen Over the Air (OTA) ausrollen (siehe <a href=\"https:\/\/borncity.com\/blog\/2013\/11\/24\/android-ota-update-prozess-entrtselt\/\">Android OTA-Update-Prozess entr\u00e4tselt<\/a>). Wer nicht so lange warten will, kann sich die Factory-Images f\u00fcr die unterst\u00fctzten Nexus-Ger\u00e4t von <a href=\"https:\/\/developers.google.com\/android\/nexus\/images\" target=\"_blank\" rel=\"noopener\">dieser Entwicklerseite<\/a> herunterladen und installieren. Wie das heruntergeladene Factory Image installiert wird, habe ich im Artikel <a href=\"https:\/\/borncity.com\/blog\/2014\/11\/15\/android-5-0-auf-dem-nexus-7-2013-installieren\/\">Android 5.0 auf dem Nexus 7 (2013) installieren<\/a> beschrieben. Wie das OTA-Update aus der ZIP-Datei installiert wird, ist im Artikel <a href=\"https:\/\/borncity.com\/blog\/2014\/11\/17\/lollipop-ota-sideload-update-fr-das-nexus-4-step-by-step\/\">Lollipop OTA sideload-Update f\u00fcr das Nexus 4 Step-by-step<\/a> beschrieben.<\/p>\n<p><strong>\u00c4hnliche Artikel<\/strong><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2016\/03\/21\/neue-stagefright-angriffsmethode-in-android-gefunden\/\">Neue Stagefright-Angriffsmethode in Android gefunden<\/a><br \/>\nAndroid und die Stagefright-L\u00fccken: Nexus und Galaxy S4<br \/>\n<a href=\"https:\/\/web.archive.org\/web\/20151110133041\/https:\/\/www.borncity.com:80\/blog\/2015\/10\/07\/google-fixt-stagefright-2-0-lcke-in-android\/\">Google fixt Stagefright 2.0-L\u00fccke in Android<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2016\/05\/04\/android-sicherheitsupdate-und-neue-google-tastatur\/\">Android Sicherheitsupdate und neue Google Tastatur<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2016\/05\/09\/android-sicherheitsinfos-9-5-2016\/\">Android Sicherheitsinfos 9.5.2016<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2016\/04\/06\/android-sicherheits-update-april-2016\/\">Android Sicherheits-Update April 2016<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/blog\/2013\/11\/24\/android-ota-update-prozess-entrtselt\/\">Android OTA-Update-Prozess entr\u00e4tselt <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Auch im Juni 2016 bessert Google bei Android mit einem Sicherheits-Update f\u00fcr seine (noch unterst\u00fctzten) Nexus-Ger\u00e4te nach. Hier ein paar Informationen, was es zu wissen gibt.<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[185],"tags":[4308,1809,4328,4315],"class_list":["post-178095","post","type-post","status-publish","format-standard","hentry","category-update","tag-android","tag-nexus","tag-sicherheit","tag-update"],"_links":{"self":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts\/178095","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/comments?post=178095"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/posts\/178095\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/media?parent=178095"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/categories?post=178095"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/blog\/wp-json\/wp\/v2\/tags?post=178095"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}