{"id":6162,"date":"2019-07-05T14:34:32","date_gmt":"2019-07-05T14:34:32","guid":{"rendered":"https:\/\/gtechbooster.com\/?p=6162"},"modified":"2023-04-01T01:36:51","modified_gmt":"2023-04-01T01:36:51","slug":"google-android-july-security-bulletin-fixes-3-critical-rce-bugs","status":"publish","type":"post","link":"https:\/\/gtechbooster.com\/google-android-july-security-bulletin-fixes-3-critical-rce-bugs\/","title":{"rendered":"Google Android July Security Bulletin Fixes 3 Critical RCE Bugs"},"content":{"rendered":"\n<p>Google has released fixes for three critical remote code execution \nbugs in the media framework of its Android operating system. These flaws\n could allow a remote attacker to execute arbitrary code.<\/p>\n\n\n\n<div class=\"gtech-migrated-from-ad-inserter-placement-2\" style=\"text-align: center;\" id=\"gtech-885483061\"><div style=\"margin-right: auto;margin-left: auto;text-align: center;\" id=\"gtech-2777356788\"><a data-bid=\"1\" data-no-instant=\"1\" href=\"https:\/\/gtechbooster.com\/linkout\/17207\" rel=\"noopener\" class=\"notrack\" aria-label=\"26001\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gtechbooster.com\/media\/2023\/01\/26001.jpeg\" alt=\"\"  srcset=\"https:\/\/gtechbooster.com\/media\/2023\/01\/26001.jpeg 1024w, https:\/\/gtechbooster.com\/media\/2023\/01\/26001-768x960.jpeg 768w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" width=\"500\" height=\"625\"  style=\"display: inline-block;\" \/><\/a><\/div><\/div><p>The flaws are part of Google\u2019s July Android Security Bulletin, which \nincluded fixes for 12 critical and high-severity vulnerabilities. For \nits part, Qualcomm, whose chips are used in Android devices, also \npatched 21 vulnerabilities, according to the bulletin.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\"><p>\u201cThe most severe of these issues is a critical security vulnerability  in Media framework that could enable a remote attacker using a  specially crafted file to execute arbitrary code within the context of a  privileged process,\u201d <\/p><cite> according to Android\u2019s <a rel=\"noreferrer noopener\" href=\"https:\/\/source.android.com\/security\/bulletin\/2019-07-01#framework\" target=\"_blank\">Monday security bulletin<\/a>. <\/cite><\/blockquote>\n\n\n\n<p>These three critical flaws (CVE-2019-2106, CVE-2019-2107, \nCVE-2019-2109) exist in Android\u2019s Media framework. This framework \nincludes support for playing variety of common media types, so that \nusers can easily utilize audio, video and images.<\/p>\n\n\n\n<p>The flaws \u201ccould enable a remote attacker using a specially crafted \nfile to execute arbitrary code within the context of a privileged \nprocess\u201d according to Google.<\/p>\n\n\n\n<p>Another critical vulnerability (CVE-2019-2111) also exists in the \nAndroid operating system. The critical remote code execution flaw could \nallow a remote attacker using a specially crafted file to execute \narbitrary code, according to the advisory.<\/p>\n\n\n\n<p>Overall, the operating system had six other high-severity \nvulnerabilities, including four information disclosure flaws \n(CVE-2019-2116, CVE-2019-2117, CVE-2019-2118, CVE-2019-2119) and two \nelevation of privilege flaws (CVE-2019-2112, CVE-2019-2113).<\/p>\n\n\n\n<p>Also patched was a high severity information disclosure flaw \n(CVE-2019-2104) in the Android framework, and a high-severity remote \ncode execution vulnerability (CVE-2019-2105) in the Android library.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"12997\">Qualcomm Patches<\/h2>\n\n\n\n<p>Google also patched 21 CVEs related to <a href=\"https:\/\/www.qualcomm.com\/company\/product-security\/bulletins\">Qualcomm components<\/a>,\n which are used in Android devices. Included are a slew of \nvulnerabilities impacting various Qualcomm components, including kernel,\n audio and closed-source components. These include five critical \nseverity vulnerabilities and 16 high-severity flaws.<\/p>\n\n\n\n<p>Google said there are no reports of the vulnerabilities being actively exploited.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"18650\">Manufacturer Updates<\/h2>\n\n\n\n<p>Manufacturers of Android devices push out their own patches to \naddress the July updates in tandem with or after the Google Security \nBulletin.<\/p>\n\n\n\n<p>LG issued a security update addressing patches released by Google, \nincluding all critical flaws. \u201cLG recommends all users update their \ndevices to the latest SW,\u201d according to the <a href=\"https:\/\/lgsecurity.lge.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">release<\/a>. \u201cAll SW updates include all the available security patches at the moment of release.\u201d<\/p>\n\n\n\n<p>Samsung said in a <a href=\"https:\/\/security.samsungmobile.com\/securityUpdate.smsb\" target=\"_blank\" rel=\"noreferrer noopener\">security alert<\/a>\n it is releasing a maintenance release for major flagship models as part\n of monthly Security Maintenance Release (SMR) process \u2013 including \npatches from Google.<\/p>\n\n\n\n<p>In an <a rel=\"noreferrer noopener\" href=\"https:\/\/www.nokia.com\/phones\/en_int\/security-updates\" target=\"_blank\">online statement<\/a>,  Nokia said: \u201c[Nokia owner] HMD Global is delivering the latest Security  Patches to your Android smartphone as quickly as possible. However,  there are several factors which may affect the date you actually receive  an update. These factors include device model, region, location,  operator approvals, and Google\u2019s Security Patch Monthly Release  announcement. Security Patches are also sometimes included with  Maintenance Releases.\u201d<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">More Information<\/h2>\n\n\n\n<ul class=\"wp-block-list\"><li><a rel=\"noreferrer noopener\" href=\"https:\/\/source.android.com\/security\/bulletin\/2019-07-01#framework\" target=\"_blank\">Monday security bulletin<\/a><\/li><li><a href=\"https:\/\/www.qualcomm.com\/company\/product-security\/bulletins\">Qualcomm components<\/a> <\/li><li> <a href=\"https:\/\/lgsecurity.lge.com\/\">LG issued a security update<\/a> <\/li><li><a href=\"https:\/\/security.samsungmobile.com\/securityUpdate.smsb\"> Samsung said in a security alert <\/a><\/li><\/ul>\n\n\n\n<p>Credit: <a href=\"https:\/\/threatpost.com\/google-july-android-security-bulletin-fixes-3-critical-rce-bugs\/146192\/\">ThreatPost<\/a><\/p>\n<div class=\"gtech-end-cont\" id=\"gtech-3400767078\"><div style=\"margin-right: auto;margin-left: auto;text-align: center;\" id=\"gtech-1243822432\"><a data-bid=\"1\" data-no-instant=\"1\" href=\"https:\/\/gtechbooster.com\/linkout\/17207\" rel=\"noopener\" class=\"notrack\" aria-label=\"26001\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/gtechbooster.com\/media\/2023\/01\/26001.jpeg\" alt=\"\"  srcset=\"https:\/\/gtechbooster.com\/media\/2023\/01\/26001.jpeg 1024w, https:\/\/gtechbooster.com\/media\/2023\/01\/26001-768x960.jpeg 768w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" width=\"500\" height=\"625\"  style=\"display: inline-block;\" \/><\/a><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Google has released fixes for three critical remote code execution bugs in the media framework of its Android operating system. These flaws could allow a remote attacker to execute arbitrary code. The flaws are part of Google\u2019s July Android Security Bulletin, which included fixes for 12 critical and high-severity vulnerabilities. For its part, Qualcomm, whose [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":6163,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1915],"tags":[64,372,511,6,967,700],"class_list":["post-6162","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ndocs","tag-android","tag-google","tag-lg-electronics","tag-programming","tag-qualcomm","tag-samsung"],"blocksy_meta":{"styles_descriptor":{"styles":{"desktop":"","tablet":"","mobile":""},"google_fonts":[],"version":6}},"_links":{"self":[{"href":"https:\/\/gtechbooster.com\/api-json\/wp\/v2\/posts\/6162","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gtechbooster.com\/api-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gtechbooster.com\/api-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gtechbooster.com\/api-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/gtechbooster.com\/api-json\/wp\/v2\/comments?post=6162"}],"version-history":[{"count":0,"href":"https:\/\/gtechbooster.com\/api-json\/wp\/v2\/posts\/6162\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/gtechbooster.com\/api-json\/wp\/v2\/media\/6163"}],"wp:attachment":[{"href":"https:\/\/gtechbooster.com\/api-json\/wp\/v2\/media?parent=6162"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gtechbooster.com\/api-json\/wp\/v2\/categories?post=6162"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gtechbooster.com\/api-json\/wp\/v2\/tags?post=6162"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}