March Security Patch Now Available for Nexus Devices and Pixel C – Download Factory Images Here

Google has begun to roll out their monthly security patch to Nexus devices along with the Pixel C, with this update being built for the month of March 2016. According to the March security bulletin board, there are 16 fixes made to the software ranging from moderate to critical in severity. These bugs and issues were discovered by the Android and Chrome security teams alongside other independent researchers.

nexus2cee_pv9actqs-gotb5ply6js6sgqwcmrxcvbzlicenbfwh5q-iw7cf6rrgm-tr7dsm0z2bbvgas2048_thumb1

Here’s a rundown of all the bugs fixed in this month’s security patch:

Issue CVE Severity
Remote Code Execution Vulnerability in Mediaserver CVE-2016-0815
CVE-2016-0816
Critical
Remote Code Execution Vulnerabilities in libvpx CVE-2016-1621 Critical
Elevation of Privilege in Conscrypt CVE-2016-0818 Critical
Elevation of Privilege Vulnerability in the Qualcomm
Performance Component
CVE-2016-0819 Critical
Elevation of Privilege Vulnerability in MediaTek Wi-Fi Driver CVE-2016-0820 Critical
Elevation of Privilege Vulnerability in Keyring Component CVE-2016-0728 Critical
Mitigation Bypass Vulnerability in the Kernel CVE-2016-0821 High
Elevation of Privilege in MediaTek Connectivity Driver CVE-2016-0822 High
Information Disclosure Vulnerability in Kernel CVE-2016-0823 High
Information Disclosure Vulnerability in libstagefright CVE-2016-0824 High
Information Disclosure Vulnerability in Widevine CVE-2016-0825 High
Elevation of Privilege Vulnerability in Mediaserver CVE-2016-0826
CVE-2016-0827
High
Information Disclosure Vulnerability in Mediaserver CVE-2016-0828
CVE-2016-0829
High
Remote Denial of Service Vulnerability in Bluetooth CVE-2016-0830 High
Information Disclosure Vulnerability in Telephony CVE-2016-0831 Moderate
Elevation of Privilege Vulnerability in Setup Wizard CVE-2016-0832 Moderate

Normally, you can expect the patch to hit your device in about a week, however if you’re impatient, you can download the appropriate factory image for your device you can flash manually.

Google has provided users with a guide on how to flash the image to your device. As I don’t currently have one personally, I thought I’d add Google’s to this report for reference.

Flashing Instructions

To flash a device using one of the system images below (or one of your own), you need the latest fastboot tool. You can get it from one of the sources below.

Once you have the fastboot tool, add it to your PATH environment variable (the flash-all script below must be able to find it). Also be certain that you’ve set up USB access for your device, as described in the Using Hardware Devicesguide.

Caution: Flashing a new system image deletes all user data. Be certain to first backup any personal data such as photos.

To flash a system image:

  1. Download the appropriate system image for your device below, then unzip it to a safe directory.
  2. Connect your device to your computer over USB.
  3. Start the device in fastboot mode with one of the following methods:
    • Using the adb tool: With the device powered on, execute:
      adb reboot bootloader
    • Using a key combo: Turn the device off, then turn it on and immediately hold down the relevant key combination for your device. For example, to put a Nexus 5 (“hammerhead”) into fastboot mode, press and hold Volume Up + Volume Down + Power as the device begins booting up.
  4. If necessary, unlock the device’s bootloader by running:
    fastboot flashing unlock

    or, for older devices, running:

    fastboot oem unlock

    The target device will show you a confirmation screen. (This erases all data on the target device.)

  5. Open a terminal and navigate to the unzipped system image directory.
  6. Execute the flash-all script. This script installs the necessary bootloader, baseband firmware(s), and operating system.

Once the script finishes, your device reboots. You should now lock the bootloader for security:

  1. Start the device in fastboot mode again, as described above.
  2. Execute:
    fastboot flashing lock

    or, for older devices, running:

    fastboot oem lock

Locking bootloader will wipe the data on some devices. After locking the bootloader, if you want to flash the device again, you must run fastboot oem unlock again, which will wipe the data.

marshmallows

Have you received the security patch yet for March on your Nexus device? Let us know in the comments!