Google fixes 15 critical Android flaws in April patch

Android’s Mediaserver and libstragefright are once again among the most serious issues to be fixed in this month’s update rolling out to Nexus devices today. The update has seven fixes for critical bugs in the Mediaserver process alone, as well as another remote code execution bug in the Media Codec used by Mediaserver.

All of the bugs affecting Mediaserver, libstragefright and the media codec can enable remote code execution if a specially crafted media file is delivered to an affected device via email, through a browser, or an MMS.

Several of the Mediaserver bugs affect Android versions 4.4.4, 5.0.2, 5.1.1, 6.0, and 6.0.1.

Google said Android handset partners were informed of the April update details on March 16 or earlier. Samsung will likely have a patch ready for select Galaxy devices in the coming three weeks.

Also bundled in this update is a kernel bug that Google addressed in March in a separate update for Nexus devices after confirming the discovery of an application in the wild that exploited the bug. Google warned at the time the app could lead to “local permanent device compromise”.

Another two bugs, now fixed, that could have the same impact are an elevation of privilege flaw affecting the Qualcomm performance module and a flaw in the Qualcomm RF component. They’re both rated critical because they can be exploited by a local malicious app to execute code in the kernel.

Google also fixed a separate critical elevation of privilege bug in the kernel that could allow a malicious local app to execute arbitrary code in the kernel. Once again, it could lead to permanent device compromise.

The final set of critical bugs in this update address three flaws in the Dynamic Host Configuration Protocol service (DHCP) service. A memory corruption osier could be exploited to achieve remote code execution in the DHCP client.

Besides the 15 critical bugs in this month’s update, Google also fixed 16 “high severity” bugs and eight moderate issues.

Google’s own researchers identified nine of the bugs in this month with the remainder found and reported by external researchers who may have qualified for a cash award under the Android bug bounty program.

Take this 5 minute survey on The State of Cloud Storage & Collaboration 2016 and go in the draw to win a $500 Visa credit card.Start Survey NOW

Tags GoogleAndroidhackapplicationsqualcommmmscyber secuityGoogle Nexusbugs and security failurescritical securityNexus devicesmediaserverMedia CodecLibstragefrightMemory corruptionDHCP

Show Comments