Google, as expected, has released its monthly security update for its Nexus range of the devices. Apart from the monthly security update, Google has also released the latest Nexus factory images on the developer site.
The company says that the source code patches for the new issues will be released to the Android Open Source Project (AOSP) repository over the next 48 hours. Google notes that partner OEMs were notified about the issues described in the May bulletin on April 4. One of the most severe of these issues was a critical security vulnerability that could enable remote code execution on an affected device through multiple methods (including email, web browsing, and MMS when processing media files).
According to Google, the latest build MTC19T is available for the Nexus 6P and Nexus 5X; the MOB30I build is available for the Nexus 6, MOB30G Nexus Player, Nexus 9, Nexus 9 LTE; MOB30H for the Nexus 5; MOB30J for the Nexus 7 (2013) and Nexus 7 3G, and MXC89F for the Pixel C. Users can manually download and flash the zip update file for the Nexus devices from Google's Nexus Factory Images page.
One of the most notable changes announced with May security bulletin was that Google renamed the bulletin (and all following in the series) to the Android Security Bulletin. Previously it was dubbed Nexus Security bulletin. Google says, "These bulletins encompass a broader range of vulnerabilities that may affect Android devices, even if they do not affect Nexus devices."
Google also updated the Android Security severity ratings which are based on the result of data collected over the last six months on reported security vulnerabilities. The bulletin says that there were no reports of active customer exploitation or abuse of these newly reported issues.
The latest May update patches six vulnerabilities that have been flagged as "critical" by Google, and 12 vulnerabilities that fall on the spectrum of "high" severity. The company has also listed six "moderate" security glitches that have also been resolved.
Comments
Post a Comment