Eight critical and 28 high-risk vulnerabilities were fixed in the June Android security update The June batch of Android security patches addresses nearly two dozen vulnerabilities in system drivers for various hardware components from several chipset makers. The largest number of critical and high severity flaws were patched in the Qualcomm video driver, sound driver, GPU driver, Wi-Fi driver, and camera driver. Some of these privilege escalation vulnerabilities could allow malicious applications to execute malicious code in the kernel leading to a permanent device compromise. Similar high-risk flaws were fixed in the Broadcom Wi-Fi driver, NVIDIA camera driver, and MediaTek power management driver. These vulnerabilities can give regular applications access to privileges or system settings that they shouldn’t have. In some cases, the flaws allow kernel code execution, but only if the attacker compromises a different service first to communicate with the vulnerable driver. These flaws are a warning that chipset makers should put more effort into testing their code, which typically consists of drivers that run in the most privileged areas of the OS. In addition to fixing 21 vulnerabilities in system drivers for various hardware components from several chipset makers, Google fixed more than a dozen flaws in the mediaserver component. One critical, 12 high-risk and one moderate flaw were fixed in mediaserver, a component that handles audio and video file processing on Android. Google has been working hard to strengthen mediaserver for the past year. One critical vulnerability was patched in libwebm, which could allow applications to execute code in the context of the mediaserver process that has special privileges. In addition, a high-risk flaw was fixed in the SD card emulation layer, a moderate one in the Framework UI, and one in the activity manager. Google released updated Android firmware images and over-the-air updates Monday for its supported Nexus devices: Nexus 5, Nexus 5X, Nexus 6, and Nexus 6P. The company has also notified device manufacturers about these issues on May 2 so they can prepare their own firmware updates. The patches will be released to the Android Open Source Project (AOSP) over the next 48 hours so that community-developed Android firmware and other projects that rely on the AOSP code can integrate them. Related content news Nscale offers AMD AI chips-as-a-service in green data center Cloud GPU provider sees AMD chips now as a faster alternative to Nvidia chips tomorrow. By Sascha Brodsky May 03, 2024 3 mins Data Center news Palo Alto extends SASE security, performance features Palo Alto rolls out Prisma SASE 3.0 to secure unmanaged devices, increase AI capabilities. By Michael Cooney May 02, 2024 3 mins SASE Network Security Networking how-to The logic of && and || on Linux These AND and OR equivalents can be used in scripts to determine next actions. By Sandra Henry-Stocker May 02, 2024 4 mins Linux analysis Cisco-backed startup Corelight raises $150M to expand network security services Corelight aims to boost AI-driven security operations, cloud visibility and detection, and next-generation SIEM platforms. By Michael Cooney May 02, 2024 4 mins Network Security Networking PODCASTS VIDEOS RESOURCES EVENTS NEWSLETTERS Newsletter Promo Module Test Description for newsletter promo module. Please enter a valid email address Subscribe