OS 360 Security Bulletin Board

OS 360 is the Elo's way of securing your Elo Android devices from the emerging Android threats. OS 360 offers security updates and Android OS upgrades to ensure the Elo Android devices have a longer OS life and performs optimally throughout its lifecycle. Here you will find details on the latest updates for your Elo Android devices supported under OS 360.

Elo makes every effort to deliver monthly security updates in a timely manner.

Please note, some updates may take longer than others if additional review and quality check is needed to ensure that the integrity of each Elo device is not compromised. Elo will do its best to align the releases with chipset vendors. In case Elo is not able to release an update for a specific month it will be integrated as part of the following release.

Month Severe Vulnerabilities Supported Devices
& OS Versions
August 2022 Android Security Bulletin The most severe vulnerability
for this month could:
  1. Lead to local escalation of privilege with no additional execution privileges needed.
  2. Lead to remote information disclosure with no additional execution privileges needed.
  3. Lead to local escalation of privileges with User execution privileges needed.
Supported Devices
I-Series 4, Backpack 4, M50, M50C, M60, M60C

OS Versions
Standard
GMS: 5.000.018.0001+p
AOSP: 5.000.018.0001+ap
Value
GMS: 5.000.019.0005+v
AOSP: 5.000.019.0005+av
July 2022 Android Security Bulletin The most severe vulnerability
for this month could:
  1. Lead to local information disclosure with no additional execution privileges needed.
  2. Lead to remote code execution with no additional execution privileges needed.
  3. Lead to local escalation of privilege with User execution privileges needed.
Supported Devices
I-Series 4, Backpack 4, M50, M50C, M60, M60C

OS Versions
Standard
GMS: 5.000.017.0001+p
AOSP: 5.000.017.0001+ap
Value
GMS: 5.000.018.0005+v
AOSP: 5.000.018.0005+av
June 2022 Android Security Bulletin The most severe vulnerability
for this month could:
  1. Lead to local escalation of privilege with User execution privileges needed.
  2. Lead to remote code execution with no additional execution privileges needed.
Supported Devices
I-Series 4, Backpack 4, M50, M50C, M60, M60C

OS Versions
Standard
GMS: 5.000.016.0001+p
AOSP: 5.000.016.0001+ap
Value
GMS: 5.000.017.0005+v
AOSP: 5.000.017.0005+av
May 2022 Android Security Bulletin The most severe vulnerability
for this month could:
  1. Lead to local escalation of privilege with User execution privileges needed.
  2. Lead to local escalation of privilege with no additional execution privileges needed.
  3. Lead to local escalation of privilege in system libraries with no additional execution privileges needed.
Supported Devices
I-Series 4, Backpack 4, M50, M50C, M60, M60C

OS Versions
Standard
GMS:5.000.015.0001+p
AOSP: 5.000.015.0001+ap
Value
GMS: 5.000.016.0091+v
AOSP: 5.000.016.0091+av
April 2022 Android Security Bulletin The most severe vulnerability
for this month could:
  1. Lead to local escalation of privilege with no additional execution privileges needed.
  2. Lead to remote information disclosure with no additional execution privileges needed.
  3. Lead to local escalation of privilege from the Guest account with no additional execution privileges needed.
Supported Devices
I-Series 4, Backpack 4, M50, M50C, M60, M60C

OS Versions
Standard
GMS:5.000.014.0001+p
AOSP: 5.000.014.0001+ap
Value
GMS: 5.000.015.0004+v
AOSP: 5.000.015.0004+av
March 2022 Android Security Bulletin The most severe vulnerability
for this month could:
  1. Lead to local escalation of privilege with System execution privileges needed.
  2. Lead to local escalation of privilege with User execution privileges needed.
  3. Lead to remote information disclosure with no additional execution privileges needed.
  4. Lead to remote escalation of privilege with no additional execution privileges needed.
  5. Lead to local escalation of privilege with no additional execution privileges needed.
Supported Devices
I-Series 4, Backpack 4, M50, M50C, M60, M60C

OS Versions
Standard
GMS: 5.000.013.0037+p
AOSP: 5.000.013.0037+ap
Value
GMS: 5.000.014.0011+v
AOSP: 5.000.014.0011+av
February 2022 Android Security Bulletin The most severe vulnerability
for this month could:
  1. Lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
  2. Lead to remote escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
  3. Lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation.
Supported Devices
I-Series 4, Backpack 4, M50, M50C, M60, M60C

OS Versions
Standard
GMS: 5.000.012.0008+p
AOSP: 5.000.012.0008+ap
Value
GMS: 5.000.012.0001+v
AOSP: 5.000.012.0001+av
January 2022 Android Security Bulletin The most severe vulnerability
for this month could:
  1. Enable a local malicious application to bypass user interaction requirements in order to gain access to additional permissions.
  2. Lead to remote escalation of privilege with no additional execution privileges or user interaction needed.
  3. Enable a local privileged attacker to install existing packages without requiring user consent.
  4. Enable a local attacker to bypass memory restrictions in order to gain access to additional permissions.
  5. Lead to a local escalation of privilege due to a race condition, with no additional execution privileges or user interaction needed.
Supported Devices
I-Series 4, Backpack 4, M50, M50C, M60, M60C

OS Versions
Standard
GMS: 5.000.011.0005+p
AOSP: 5.000.011.0005+ap
Value
GMS: 5.000.011.0013+v
AOSP: 5.000.011.0013+av
Month Severe Vulnerabilities Supported Devices
& OS Versions
December 2021 Android Security Bulletin The most severe vulnerability
for this month could:
  1. Lead to memory corruption by a local attacker, with no privileges or user interaction required.
  2. Lead to remote information disclosure with no additional execution privileges needed.
  3. Enable a remote attacker to execute arbitrary code within the context of a privileged process.
  4. Lead to remote information disclosure with no additional execution privileges needed.
  5. Lead to an integer overflow, an Out-of-bounds Write, and escalation to root by an unprivileged user.
Supported Devices
I-Series 4, Backpack 4, M50, M50C, M60, M60C

OS Versions
Standard
GMS: 5.000.010.0019+p
AOSP: 5.000.010.0019+ap
Value
GMS: 5.000.011.0013+v
AOSP: 5.000.011.0013+av
November 2021 Android Security Bulletin The most severe vulnerability
for this month could:
  1. Enable a local attacker to gain access to additional permissions with no user interaction required.
  2. Enable a local malicious application to bypass user interaction requirements in order to gain access to additional permissions.
  3. Enable a remote attacker using a specially crafted transmission to execute arbitrary code within the context of a privileged process.
Supported Devices
I-Series 4, Backpack 4, M50, M50C

OS Versions
Standard
GMS: 5.000.009.0013+p
AOSP: 5.000.009.0013+ap
Value
GMS: 5.000.010.0096+v
AOSP: 5.000.010.0096+av
October 2021 Android Security Bulletin The most severe vulnerability
for this month could:
  1. Enable a local malicious application to execute arbitrary code within the context of a privileged process.
  2. Enable a local attacker with physical access to the device to execute arbitrary code in order to gain access to additional permissions.
Supported Devices
I-Series 4, Backpack 4, M50, M50C

OS Versions
Standard
GMS: 5.000.008.0007+p
AOSP: 5.000.008.0005+ap
Value
GMS: 5.000.009.0011+v
AOSP: 5.000.009.0011+av
September 2021 Android Security Bulletin The most severe vulnerability
for this month could:
  1. Enable a remote attacker using a specially crafted file to cause a permanent denial of service.
  2. Enable a local malicious application to bypass operating system protections that isolate application data from other applications.
Supported Devices
I-Series 4, Backpack 4, M50, M50C

OS Versions
Standard
GMS: 5.000.007.0001+p
AOSP: 5.000.007.0001+ap
Value
GMS: 5.000.008.0010+v
AOSP: 5.000.008.0010+av