Google Patches Critical Security Flaws For Android

Google has released a security update for Android containing fixes for 12 vulnerabilities, five of which are rated as “critical”. The most pressing critical security flaw in this latest round of patches is related to the mobile operating system’s Mediaserver program, which is where the now infamous “Stagefright” bug spawned from.

Image: Family O’Abé

The Android’s Mediaserver component has proved to be problematic for Google and there have been numerous other security flaws that have been found in the past few months that tie back to the program. In Google’s most recent security update, it fixes a newly found remote code execution vulnerability in Mediaserver.

According to Google:

The affected functionality is provided as a core part of the operating system and there are multiple applications that allow it to be reached with remote content, most notably MMS and browser playback of media.
 
The affected functionality is provided as a core part of the operating system and there are multiple applications that allow it to be reached with remote content, most notably MMS and browser playback of media.

Google is rolling out the update first to its Nexus devices over-the-air as part of its Android Security Bulletin Monthly Release process. Android handset makers have been notified so expect to see an update to your Android phone soon. The source code patches for these issues will be released to the Android Open Source project in the next few days.

You can find out more about all 12 security patches over at the Android Security Bulletin page.

[Via Android Security Bulletin]


The Cheapest NBN 50 Plans

Here are the cheapest plans available for Australia’s most popular NBN speed tier.

At Lifehacker, we independently select and write about stuff we love and think you'll like too. We have affiliate and advertising partnerships, which means we may collect a share of sales or other compensation from the links on this page. BTW – prices are accurate and items in stock at the time of posting.

Comments