The ne batch of Android security patches addresses nearly two dozen vulnerabilities in system drivers for various hardware components from several chipset makers.
The largest number of critical high severity flaws were patched in the Qualcomm video driver, sound driver, G driver, -Fi driver, camera driver. Some of these privilege escalation vulnerabilities could allow malicious applications to execute malicious code in the kernel leading to a permanent device compromise.
Similar high-risk flaws were fixed in the Broadcom -Fi driver, NVIDIA camera driver, Tek power management driver. These vulnerabilities can give regular applications access to privileges or system settings that they shouldn’t have. In some cases, the flaws allow kernel code execution, but only if the attacker compromises a different service first to communicate with the vulnerable driver.
These flaws are a warning that chipset makers should put more effort into testing their code, which typically consists of drivers that run in the most privileged areas of the OS.
In addition to fixing 21 vulnerabilities in system drivers for various hardware components from several chipset makers, fixed more than a dozen flaws in the mediaserver component.
One critical, 12 high-risk one moderate flaw were fixed in mediaserver, a component that hles audio video file processing on Android. has been working hard to strengthen mediaserver for the past year.
One critical vulnerability was patched in libwebm, which could allow applications to execute code in the context of the mediaserver process that has special privileges.
In addition, a high-risk flaw was fixed in the SD card emulation layer, a moderate one in the Framework UI, one in the activity manager.
released updated Android firmware images over-the-air updates Monday for its supported Nexus devices: Nexus 5, Nexus 5X, Nexus 6, Nexus 6 The company has also notified device manufacturers about these issues on May 2 so they can prepare their own firmware updates.
The patches will be released to the Android Open Source oject (AOS over the next 48 hours so that community-developed Android firmware other projects that rely on the AOScode can integrate them.