Close Menu
The Daily PostingThe Daily Posting
  • Home
  • Android
  • Business
  • IPhone
    • Lifestyle
  • Politics
  • Europe
  • Science
    • Top Post
  • USA
  • World
Facebook X (Twitter) Instagram
Trending
  • Jennifer Lopez and Ben Affleck reveal summer plans after Europe trip
  • T20 World Cup: Quiet contributions from Akshar Patel, Kuldeep Yadav and Ravindra Jadeja justify Rohit Sharma’s spin vision | Cricket News
  • The impact of a sedentary lifestyle on health
  • Bartok: The World of Lilette
  • Economists say the sharp rise in the U.S. budget deficit will put a strain on Americans’ incomes
  • Our Times: Williams memorial unveiled on July 4th | Lifestyle
  • Heatwaves in Europe are becoming more dangerous: what it means for travelers
  • Christian Science speaker to visit Chatauqua Institute Sunday | News, Sports, Jobs
Facebook X (Twitter) Instagram
The Daily PostingThe Daily Posting
  • Home
  • Android
  • Business
  • IPhone
    • Lifestyle
  • Politics
  • Europe
  • Science
    • Top Post
  • USA
  • World
The Daily PostingThe Daily Posting
Android

Google patches critical Android vulnerability for devices with Qualcomm chipsets

thedailyposting.comBy thedailyposting.comApril 2, 2024No Comments

[ad_1]

Google closed 28 leaks during the April Android patch cycle, including one critical one. This breach leaves mobile phones equipped with Qualcomm chipsets vulnerable to remote attacks. Another high-priority vulnerability is in the code of Android itself, allowing malicious apps to increase their privileges without user interaction.

The latter vulnerability could allow such apps to access data or perform actions beyond their normal permissions. According to a report from security.nl, Google has classified the impact of this breach as “high.” Both vulnerabilities are listed in Google’s own April security bulletin.

Cause of buffer overflow

A major breach of Android devices with Qualcomm chipsets involves a security flaw in the data modem. This could allow an attacker to cause a buffer overflow during DTLS protocol handshake validation, potentially allowing code execution. The vulnerability, coded CVE-2023-28582, has a severity rating of 9.8 out of 10 on the CVSS vulnerability scale. This vulnerability is included in Qualcomm’s proprietary security bulletin.

Google has fixed flaws in the code of its Android operating system and components from chipmakers such as Qualcomm and MediaTek. Widevine, the DRM system developed by Google, will also receive an update. The company uses specific dates to do this. Devices receiving the April update will have a patch level of “2024-04-01” or “2024-04-05.”

Manufacturers must include all patches from the April Android Bulletin in their updates and make them available to users. These updates are available for Android 12, 12L, 13, and 14.

Similar to the vulnerability fixed in January

Google patched a similar vulnerability in phones equipped with Qualcomm chips in January’s Android security update. This breach was also in the data modem, and like the most recent breach, the phone could be remotely attacked through code injection during a buffer overflow.

Google reports that the manufacturer was notified of the vulnerability at least a month ago. However, as always, there is no guarantee that all Android devices will receive the update immediately. This is due to manufacturers ending support or delays in rolling out updates.

Also read: Second preview of Android 15 brings features for satellite communications

[ad_2]

Source link

thedailyposting.com
  • Website

Related Posts

Qualcomm wants to make it easier for phone makers to issue Android updates

June 28, 2024

Qualcomm wants to make Android updates easier for OEMs

June 28, 2024

What’s new in the June 2024 Google system update for Android

June 28, 2024
Leave A Reply Cancel Reply

ads
© 2025 thedailyposting. Designed by thedailyposting.
  • Home
  • About us
  • Contact us
  • DMCA
  • Privacy Policy
  • Terms of Service
  • Advertise with Us
  • 1711155001.38
  • xtw183871351
  • 1711198661.96
  • xtw18387e4df
  • 1711246166.83
  • xtw1838741a9
  • 1711297158.04
  • xtw183870dc6
  • 1711365188.39
  • xtw183879911
  • 1711458621.62
  • xtw183874e29
  • 1711522190.64
  • xtw18387be76
  • 1711635077.58
  • xtw183874e27
  • 1711714028.74
  • xtw1838754ad
  • 1711793634.63
  • xtw183873b1e
  • 1711873287.71
  • xtw18387a946
  • 1711952126.28
  • xtw183873d99
  • 1712132776.67
  • xtw183875fe9
  • 1712201530.51
  • xtw1838743c5
  • 1712261945.28
  • xtw1838783be
  • 1712334324.07
  • xtw183873bb0
  • 1712401644.34
  • xtw183875eec
  • 1712468158.74
  • xtw18387760f
  • 1712534919.1
  • xtw183876b5c
  • 1712590059.33
  • xtw18387aa85
  • 1712647858.45
  • xtw18387da62
  • 1712898798.94
  • xtw1838737c0
  • 1712953686.67
  • xtw1838795b7
  • 1713008581.31
  • xtw18387ae6a
  • 1713063246.27
  • xtw183879b3c
  • 1713116334.31
  • xtw183872b3a
  • 1713169981.74
  • xtw18387bf0d
  • 1713224008.61
  • xtw183873807
  • 1713277771.7
  • xtw183872845
  • 1713329335.4
  • xtw183874890
  • 1716105960.56
  • xtw183870dd9
  • 1716140543.34
  • xtw18387691b

Type above and press Enter to search. Press Esc to cancel.