The Android Security Bulletin for June 2016 is live - here is what you need to know

Android Central

Android Central
Android Central
Please, Log in or Register to view URLs content!


Code changes are pushing out to AOSP, updates are coming for Nexus devices and factory images are posted and ready.

Google has released the lastest
Please, Log in or Register to view URLs content!
, with full details and new software available. The new Security Patch Level date is June 1, 2016, and changes to the Android Open Source Project should be finished and published within 48 hours. Google also tells us that partners have had access to the warnings in this month's bulletin since May 2 or earlier.


Google says that there have been zero reports of any devices actively exploited by these vulnerabilities.

This month brings patches for 21 security vulnerabilities, ranging in severity from critical to moderate. According to Google, the most severe issue is "a critical security vulnerability that could enable remote code execution on an affected device through multiple methods such as email, web browsing, and MMS when processing media files." It appears that the
Please, Log in or Register to view URLs content!
continues to be a popular focus for security researchers as well as Google's security team, which makes
Please, Log in or Register to view URLs content!
and updating separately in
Please, Log in or Register to view URLs content!
even more important.

Google also stresses (as it does each month) that there have been zero reports of any devices actively exploited by these vulnerabilities, and that platform-level security protections and service protections like SafetyNet make the risk of actually being affected quite low.

A quick summary:

  • Exploitation for many issues on Android is made more difficult by enhancements in newer versions of the Android platform. We encourage all users to update to the latest version of Android where possible.
  • The Android Security team actively monitors for abuse with Verify Apps and SafetyNet, which are designed to warn users about Potentially Harmful Applications. Verify Apps is enabled by default on devices with Google Mobile Services, and is especially important for users who install applications from outside of Google Play. Device rooting tools are prohibited within Google Play, but Verify Apps warns users when they attempt to install a detected rooting application—no matter where it comes from. Additionally, Verify Apps attempts to identify and block installation of known malicious applications that exploit a privilege escalation vulnerability. If such an application has already been installed, Verify Apps will notify the user and attempt to remove the detected application.
  • As appropriate, Google Hangouts and Messenger applications do not automatically pass media to processes such as mediaserver.

Please, Log in or Register to view URLs content!


Full details of all the issues address can be found at
Please, Log in or Register to view URLs content!
.

There is no word on when to expect the patch for any other Android-powered device, but current
Please, Log in or Register to view URLs content!
devices,
Please, Log in or Register to view URLs content!
phones and the
Please, Log in or Register to view URLs content!
have an update pushing out over-the-air starting today, and it should be rolled out to all devices in due time. If you're the impatient type (and if so, why aren't you running the Android N Beta?) you can flash the factory images posted at
Please, Log in or Register to view URLs content!
.

EZTBqtSihxk


Please, Log in or Register to view URLs content!
 

Users who are viewing this thread

Top