In-depth

Google fixes 78 vulnerabilities in Android

Tech giant patches flaw that let hackers take over your phone

Google has fixed a whopping 78 vulnerabilities in its Android operating system in its latest security bulletin.

The firm's Android October Security Bulletin, which this month addresses 31 more security flaws than last month's, is spread across two different patch levels.

"These patch levels organise security flaws based on the components they affect, with the 2016-10-01 security patch level' affecting core Android services, drivers, and components that all smartphone vendors must address with high priority," Google said in the bulletin.

Meanwhile, the second 2016-10-05 security patch level' addresses issues in selected drivers and components that only some OEMs deploy with their Android versions, and smartphone vendors are required to implement only if they use those components.

The most severe of the issues patched were critical security vulnerabilities in device-specific code that could enable remote code execution, leading to "the possibility of a local permanent device compromise", Google said. Affected devices might have require reflashing the operating system to repair the device.

"We have had no reports of active customer exploitation or abuse of these newly reported issues," Google said, advising that those concerned should refer to the Android and Google service mitigations section for details on the Android security platform protections, such as SafetyNet, which improve the security of the Android platform.

Alongside the bulletin, Google also released a security update to Nexus devices through an over-the-air (OTA) update. Within this, Google said it has released the Nexus firmware images to the Google Developer site, and the Security Patch Levels of October 05, 2016 or later address these issues.

Supported Nexus devices will receive a single OTA update with the 5 October, 2016 security patch level, Google said.

Featured Resources

Unlocking collaboration: Making software work better together

How to improve collaboration and agility with the right tech

Download now

Four steps to field service excellence

How to thrive in the experience economy

Download now

Six things a developer should know about Postgres

Why enterprises are choosing PostgreSQL

Download now

The path to CX excellence for B2B services

The four stages to thrive in the experience economy

Download now

Recommended

HackBoss malware is using Telegram to steal cryptocurrency from other hackers
cryptocurrencies

HackBoss malware is using Telegram to steal cryptocurrency from other hackers

16 Apr 2021
Mastering endpoint security implementation
Security

Mastering endpoint security implementation

16 Apr 2021
US, UK say Russia was behind SolarWinds hack
cyber attacks

US, UK say Russia was behind SolarWinds hack

16 Apr 2021

Most Popular

Microsoft is submerging servers in boiling liquid to prevent Teams outages
data centres

Microsoft is submerging servers in boiling liquid to prevent Teams outages

7 Apr 2021
University of Hertfordshire's entire IT system offline after cyber attack
cyber attacks

University of Hertfordshire's entire IT system offline after cyber attack

15 Apr 2021
NSA uncovers new "critical" flaws in Microsoft Exchange Server
servers

NSA uncovers new "critical" flaws in Microsoft Exchange Server

14 Apr 2021