Android Security Bulletin April 2017: What you need to know

0
SHARE


Image: Jack Wallen

Once once more, the Android platform has been discovered to include extra vital vulnerabilities than the earlier month. In March, there have been eight whole vital points and now, for April, there are a chart-topping 9. Let’s check out these vital flaws which can be detailed within the April 2017 Android Security bulletin.

Check your safety launch

Before we spotlight what’s included with the April 2017 Android Security Bulletin, it is at all times good to know what safety launch is put in in your system. Of the Android units I take advantage of repeatedly, each the Verizon-branded Nexus 6, working Android 7.zero, and the OnePlus three, working Android 7.1.1, are working the March safety patch (Figure A).

Figure A

Figure A

My OnePlus three with the March safety patch.

Let’s check out these vital vulnerabilities affecting the Android platform.

Critical points

Remote code execution vulnerability in Mediaserver

Color me not shocked vital concern stays for the oft-plagued Mediaserver. Once once more we’ve a distant code execution vulnerability inside the Mediaserver that might allow an attacker, utilizing a specially-crafted file, to trigger reminiscence corruption throughout media file and knowledge processing. Because of the potential of distant code execution, this concern has been rated as vital.

Related bugs: A-33641588, A-33864300, A-33966031, A-34031018, A-33934721, A-34097866

Remote code execution vulnerability in Broadcom Wi-Fi firmware

Another distant code execution vulnerability has been discovered, this time within the Broadcom Wi-Fi firmware. This concern may allow a distant attacker to execute arbitrary code inside the context of the Wi-Fi System on a Chip (SoC). Because of the potential of distant code execution, inside the context of the Wi-Fi SoC, this concern has been rated as vital.

Related bug: A-34199105

NOTE: The patch for the above vulnerability just isn’t publicly out there and could be discovered inside the newest binary drivers for Nexus units from the Google Developer web site.

SEE: Mobile units with Broadcom chipsets could also be weak to Wi-Fi hijacking

Remote code execution vulnerability in Qualcomm crypto engine driver

The Qualcomm crytpo engine driver has been discovered to include a distant code execution vulnerability that might allow a distant attacker to execute arbitrary code inside the context of the kernel. Because of the potential of distant code execution (inside the context of the kernel) this concern has been rated as vital.

Related bugs: A-34389927, QC-CR#1091408

Remote code execution vulnerability in kernel networking subsystem

A distant code execution vulnerability was situated inside the kernel networking subsystem which may allow a distant attacker to execute arbitrary code inside the kernel. This bug doesn’t have an effect on upstream kernels, so any kernel not labeled as upstream could possibly be affected. Because of the potential of distant code execution, this vulnerability has been rated as vital.

Related bugs: A-32813456, Upstream kernel

Elevation of privilege vulnerability in MediaTek touchscreen driver

The MediaTek touchscreen driver has been discovered to include an elevation of privilege vulnerability that might allow an area malicious software to execute arbitrary code inside the kernel. Because of the potential of system compromise (which may require reflashing the working system to restore the system), this concern has been rated as vital.

Related Bugs: A-30202425, M-ALPS02898189

NOTE: The patch for the A-30202425 bug just isn’t publicly out there and could be discovered inside the newest binary drivers for Nexus units from the Google Developer web site.

Elevation of privilege vulnerability in HTC touchscreen driver

Another bug in a unique touchscreen driver (this time in HTC units) has been discovered to include an elevation of privilege vulnerability that might allow an area malicious software to execute arbitrary code inside the the kernel. Because of the potential of system compromise (which may require reflashing the working system to restore the system), this concern has been rated as vital.

Related bug: A-32089409NOTE: The patch for the A-32089409 bug just isn’t publicly out there and could be discovered inside the newest binary drivers for Nexus units from the Google Developer web site.

Elevation of privilege vulnerability in kernel ION subsystem

A bug from the earlier month has proven itself once more. The ION Memory Allocator has been discovered to include an elevation of privilege vulnerability. This kernel vulnerability may allow an area malicious software to execute arbitrary, malicious code inside the context of the kernel. Because of the potential of everlasting system compromise (which may require the reflashing of the working system), this flaw has been marked as vital.

Related bug: A-34276203

NOTE: The patch for the A-34276203 bug just isn’t publicly out there and could be discovered inside the newest binary drivers for Nexus units from the Google Developer web site.

Vulnerabilities in Qualcomm parts

Two vital vulnerabilities have been discovered to have an effect on Qualcomm parts. These bugs are addressed, intimately, within the Qualcomm AMSS October 2016 safety bulletin.

Related bugs: A-31628601, A-35358527

NOTE: The patch for each the A-31628601 and the A-35358527 bugs just isn’t publicly out there and could be discovered inside the newest binary drivers for Nexus units from the Google Developer web site.

Upgrade and replace

The builders will work diligently to patch the vulnerabilities, however it’s as much as the tip customers to make sure the fixes discover their strategy to units. Make certain you not solely test for updates, however that you just apply them as quickly as they’re out there. To see the total itemizing of vulnerabilities (which incorporates quite a lot of excessive and reasonable points), try the April 2017 Android Security Bulletin.

Also see


Leave a Reply