Google Android Security Patches Takes Care of Extensive Vulnerability List

There is great news for those concerned about the capability of Google’s security measures. As a late Christmas gift, Google has prepared a new security update. The aforementioned update hit live merely days after we’d passed into 2017, bringing more protection measures to the table as Google’s defenses have been bolstered. It appears that after the new security updates were installed, a total of 95 vulnerabilities were taken care of. There were 22 critical vulnerabilities, as well as 14 high rated ones. The number of moderate cases was limited to 8. These were part of the January 1st update.

Out of the 95, 22 of the handled vulnerabilities were recognized as critical. That’s quite a lot of vulnerabilities so this updates come as something quite beneficial for Android devices.  The list of devices that were affected by these vulnerabilities includes the Google Nexus and Pixel smartphones, which are Google handsets. Remote code execution vulnerability in Mediaserver is the name of the critical vulnerability most targeted by the recent update. That particular vulnerability isn’t foreign to attackers as it was often times targeted in the past. However, the last couple of months stand testament to the dire need of a security update, which came along on the 1st of January.

A lot more issues were addressed in the update that came on the 5th of January, including issues related to GPU drivers pertaining to NVIDIA and also the problems some devices faced with Qualcomm bootloaders. Google claims that these and the other Qualcomm vulnerabilities that have been detected will not be found in its own smartphones. This is probably where Google refers to the Pixel line. The kernel memory system was another Android issue that was taken care of with this update.

The security updates are of no detriment for your smartphone, but by installing them a lot of good can be done. Some of these vulnerabilities, especially the critical ones, can have unpleasant effects on a system.

Leave a Reply

Your email address will not be published. Required fields are marked *