Google fixes 15 critical Android flaws in April patch

Android’s Mediaserver and libstragefright are once again among the most serious issues to be fixed in this month’s update rolling out to Nexus devices today. The update has seven fixes for critical bugs in the Mediaserver process alone, as well as another remote code execution bug in the Media Codec used by Mediaserver.

All of the bugs affecting Mediaserver, libstragefright and the media codec can enable remote code execution if a specially crafted media file is delivered to an affected device via email, through a browser, or an MMS.

Several of the Mediaserver bugs affect Android versions 4.4.4, 5.0.2, 5.1.1, 6.0, and 6.0.1.

Google said Android handset partners were informed of the April update details on March 16 or earlier. Samsung will likely have a patch ready for select Galaxy devices in the coming three weeks.

Also bundled in this update is a kernel bug that Google addressed in March in a separate update for Nexus devices after confirming the discovery of an application in the wild that exploited the bug. Google warned at the time the app could lead to “local permanent device compromise”.

Another two bugs, now fixed, that could have the same impact are an elevation of privilege flaw affecting the Qualcomm performance module and a flaw in the Qualcomm RF component. They’re both rated critical because they can be exploited by a local malicious app to execute code in the kernel.

Google also fixed a separate critical elevation of privilege bug in the kernel that could allow a malicious local app to execute arbitrary code in the kernel. Once again, it could lead to permanent device compromise.

The final set of critical bugs in this update address three flaws in the Dynamic Host Configuration Protocol service (DHCP) service. A memory corruption osier could be exploited to achieve remote code execution in the DHCP client.

Besides the 15 critical bugs in this month’s update, Google also fixed 16 “high severity” bugs and eight moderate issues.

Google’s own researchers identified nine of the bugs in this month with the remainder found and reported by external researchers who may have qualified for a cash award under the Android bug bounty program.

Take this 5 minute survey on The State of Cloud Storage & Collaboration 2016 and go in the draw to win a $500 Visa credit card.Start Survey NOW

Join the newsletter!


Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.
Follow our new CSO Australia LinkedIn
Follow our new social and we'll keep you in the loop for exclusive events and all things security!
Have an opinion on security? Want to have your articles published on CSO? Please contact CSO Content Manager for our guidelines.

Tags GoogleAndroidhackapplicationsqualcommmmscyber secuityGoogle Nexusbugs and security failurescritical securityNexus devicesmediaserverMedia CodecLibstragefrightMemory corruptionDHCP

More about GalaxyGoogleQualcommSamsungVisa

Show Comments

Featured Whitepapers

Editor's Recommendations

Brand Page

Stories by Liam Tung

Latest Videos

More videos

Blog Posts