After its initial availability to ShopBlackBerry devices on Feb 1st, Priv users on Rogers, Telus & Bell started receiving a 17MB update for their beloved Android-powered device on Monday, updating their device to Build AAD444.
Did you receive an update to Build AAD444? Notice any changes? Let us know in the comments below!
The following vulnerabilities have been remediated in this update:
|Remote Code Execution Vulnerabilities in Mediaserver||During media file and data processing of a specially crafted file, vulnerabilities in mediaserver could allow an attacker to cause memory corruption and remote code execution as the mediaserver process.
The affected functionality is provided as a core part of the operating system and there are multiple applications that allow it to be reached with remote content, most notably MMS and browser playback of media.
|Denial of Service Vulnerability in Minikin||A denial of service vulnerability in the Minikin library can allow a local attacker to temporarily block access to an affected device. An attacker can cause an untrusted font to be loaded and cause an integer overflow in the Minikin component, which leads to a crash.||CVE-2016-0808|
|Elevation of Privilege Vulnerability in Mediaserver||An elevation of privilege vulnerability in mediaserver can enable a local malicious application to execute arbitrary code within the context of an elevated system application.||CVE-2016-0810|
|Factory Reset Protection Bypass Vulnerabilities in Setup Wizard||Vulnerabilities in the Setup Wizard could allow a malicious attacker to bypass the Factory Reset Protection and gain access to the device.||CVE-2016-0812