Eight critical and 28 high-risk vulnerabilities were fixed in the June Android security update The June batch of Android security patches addresses nearly two dozen vulnerabilities in system drivers for various hardware components from several chipset makers.The largest number of critical and high severity flaws were patched in the Qualcomm video driver, sound driver, GPU driver, Wi-Fi driver, and camera driver. Some of these privilege escalation vulnerabilities could allow malicious applications to execute malicious code in the kernel leading to a permanent device compromise.Similar high-risk flaws were fixed in the Broadcom Wi-Fi driver, NVIDIA camera driver, and MediaTek power management driver. These vulnerabilities can give regular applications access to privileges or system settings that they shouldn’t have. In some cases, the flaws allow kernel code execution, but only if the attacker compromises a different service first to communicate with the vulnerable driver.These flaws are a warning that chipset makers should put more effort into testing their code, which typically consists of drivers that run in the most privileged areas of the OS. In addition to fixing 21 vulnerabilities in system drivers for various hardware components from several chipset makers, Google fixed more than a dozen flaws in the mediaserver component.One critical, 12 high-risk and one moderate flaw were fixed in mediaserver, a component that handles audio and video file processing on Android. Google has been working hard to strengthen mediaserver for the past year. One critical vulnerability was patched in libwebm, which could allow applications to execute code in the context of the mediaserver process that has special privileges.In addition, a high-risk flaw was fixed in the SD card emulation layer, a moderate one in the Framework UI, and one in the activity manager.Google released updated Android firmware images and over-the-air updates Monday for its supported Nexus devices: Nexus 5, Nexus 5X, Nexus 6, and Nexus 6P. The company has also notified device manufacturers about these issues on May 2 so they can prepare their own firmware updates.The patches will be released to the Android Open Source Project (AOSP) over the next 48 hours so that community-developed Android firmware and other projects that rely on the AOSP code can integrate them. Related content news Gitlab fixes bug that exploited internal policies to trigger hostile pipelines It was possible for an attacker to run pipelines as an arbitrary user via scheduled security scan policies. By Shweta Sharma Sep 21, 2023 3 mins Vulnerabilities Security feature Key findings from the CISA 2022 Top Routinely Exploited Vulnerabilities report CISA’s recommendations for vendors, developers, and end-users promote a more secure software ecosystem. By Chris Hughes Sep 21, 2023 8 mins Zero Trust Threat and Vulnerability Management Security Practices news Insider risks are getting increasingly costly The cost of cybersecurity threats caused by organization insiders rose over the course of 2023, according to a new report from the Ponemon Institute and DTEX Systems. By Jon Gold Sep 20, 2023 3 mins Budget Data and Information Security news US cyber insurance claims spike amid ransomware, funds transfer fraud, BEC attacks Cyber insurance claims frequency increased by 12% in the first half of 2023 while claims severity increased by 42% with an average loss amount of more than $115,000. By Michael Hill Sep 20, 2023 3 mins Insurance Industry Risk Management Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe