In-depth

Google fixes 78 vulnerabilities in Android

Tech giant patches flaw that let hackers take over your phone

Google has fixed a whopping 78 vulnerabilities in its Android operating system in its latest security bulletin.

The firm's Android October Security Bulletin, which this month addresses 31 more security flaws than last month's, is spread across two different patch levels.

"These patch levels organise security flaws based on the components they affect, with the 2016-10-01 security patch level' affecting core Android services, drivers, and components that all smartphone vendors must address with high priority," Google said in the bulletin.

Meanwhile, the second 2016-10-05 security patch level' addresses issues in selected drivers and components that only some OEMs deploy with their Android versions, and smartphone vendors are required to implement only if they use those components.

Advertisement
Advertisement - Article continues below

The most severe of the issues patched were critical security vulnerabilities in device-specific code that could enable remote code execution, leading to "the possibility of a local permanent device compromise", Google said. Affected devices might have require reflashing the operating system to repair the device.

"We have had no reports of active customer exploitation or abuse of these newly reported issues," Google said, advising that those concerned should refer to the Android and Google service mitigations section for details on the Android security platform protections, such as SafetyNet, which improve the security of the Android platform.

Alongside the bulletin, Google also released a security update to Nexus devices through an over-the-air (OTA) update. Within this, Google said it has released the Nexus firmware images to the Google Developer site, and the Security Patch Levels of October 05, 2016 or later address these issues.

Supported Nexus devices will receive a single OTA update with the 5 October, 2016 security patch level, Google said.

Featured Resources

The IT Pro guide to Windows 10 migration

Everything you need to know for a successful transition

Download now

Managing security risk and compliance in a challenging landscape

How key technology partners grow with your organisation

Download now

Software-defined storage for dummies

Control storage costs, eliminate storage bottlenecks and solve storage management challenges

Download now

6 best practices for escaping ransomware

A complete guide to tackling ransomware attacks

Download now
Advertisement

Recommended

Visit/malware/33080/hackers-abuse-linkedin-dms-to-plant-malware
malware

Hackers abuse LinkedIn DMs to plant malware

25 Feb 2019
Visit/security/354156/google-confirms-android-cameras-can-be-hijacked-to-spy-on-you
Security

Google confirms Android cameras can be hijacked to spy on you

20 Nov 2019
Visit/antivirus/28144/best-antivirus
antivirus

Best antivirus for Windows 10

3 Sep 2019
Visit/security/malware/28083/the-five-best-free-malware-removal-tools
Security

Best free malware removal tools 2019

8 Mar 2019

Most Popular

Visit/cloud/microsoft-azure/354230/microsoft-not-amazon-is-going-to-win-the-cloud-wars
Microsoft Azure

Microsoft, not Amazon, is going to win the cloud wars

30 Nov 2019
Visit/security/identity-and-access-management-iam/354289/44-million-microsoft-customers-found-using
identity and access management (IAM)

44 million Microsoft customers found using compromised passwords

6 Dec 2019
Visit/mobile/mobile-phones/354273/pablo-escobars-brother-launches-budget-foldable-phone
Mobile Phones

Pablo Escobar's brother launches budget foldable phone

4 Dec 2019
Visit/network-internet/wifi-hotspots/354283/industrial-wi-fi-6-trial-reveals-blistering-speeds
wifi & hotspots

Industrial Wi-Fi 6 trial reveals blistering speeds

5 Dec 2019