Android has delivered on Monday its usual security bulletin for the month of May. The update contains patches specially created for Pixel and Nexus devices. The security fixes come to the elimination of over 100 vulnerabilities. Among these, there are 29 issues that were marked as critical flaws. These bugs interfered with drivers for hardware, media processing server, and other such components.
Nexus and Pixel Gadget Owners Should Update their Software to Get Rid of Several Critical Flaws
Android published its monthly security bulletin on Monday. The new sheet followed the usual classification of two patch levels. One of them is called 2017-05-01 and offers a partial security patch level while the other has the code name of 2017-05-05 and presents the complete security patch level.
There are two methods to implement the latest security fixes. One of them is the most popular among Nexus and Pixel owners. They are going to receive an over-the-air update over the next couple of days with the complete patch. All they need is to update the software, and they’re done. However, if some users don’t want to wait until the automated update, they can enable it directly from the developer website of Google.
Google has already announced last week that older versions of Nexus, namely Nexus 6 and 9, which were launched in November 2014, are no longer going to receive security patches as of October 2017. Moreover, the guarantee for handsets Pixel and Pixel XL is going to expire as of October 2019.
Mediaserver Continued to Create Security Vulnerabilities for Android
This month’s bulletin tackles six critical flaws with Mediaserver. This is a component in charge of managing video and image files. Developers found numerous vulnerabilities with this software over the years. As a consequence, Mediaserver became a usual name in the monthly Android security patches. This is a critical issue as the component offers an open the door to any hacker that tricks users to download certain media files. Once they are in the system, the malware can become active without the need for users to open it.
Once the malware is in the system, cyber bullies receive remote code execution. Depending on the position of Mediaserver, certain devices can have their data fully compromised if they are hacked. There are other fixes that want to close some system vulnerabilities for good. However, some of them were already released by manufacturers of specific devices years ago.
Image source: 1