• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
google releases android patch update for 3 actively exploited vulnerabilities

Google Releases Android Patch Update for 3 Actively Exploited Vulnerabilities

You are here: Home / General Cyber Security News / Google Releases Android Patch Update for 3 Actively Exploited Vulnerabilities
July 7, 2023

Google has introduced its regular security updates for the Android working technique, addressing 46 new software package vulnerabilities. Amid these, three vulnerabilities have been discovered as actively exploited in qualified attacks.

A person of the vulnerabilities tracked as CVE-2023-26083 is a memory leak flaw impacting the Arm Mali GPU driver for Bifrost, Avalon, and Valhall chips. This particular vulnerability was exploited in a prior attack that enabled adware infiltration on Samsung equipment in December 2022.

This vulnerability was regarded as really serious ample to prompt the Cybersecurity and Infrastructure Security Agency (CISA) to issue a patching purchase for federal companies in April 2023.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


One more considerable vulnerability, discovered as CVE-2021-29256, is a higher-severity issue that influences precise versions of the Bifrost and Midgard Arm Mali GPU kernel motorists. This flaw permits an unprivileged person to acquire unauthorized obtain to delicate info and escalate privileges to the root level.

The 3rd exploited vulnerability, CVE-2023-2136, is a critical-severity bug found in Skia, Google’s open up-source multi-system 2D graphics library. It was in the beginning disclosed as a zero-day vulnerability in the Chrome browser and permits a remote attacker who has taken in excess of the renderer process to carry out a sandbox escape and apply distant code on Android units.

Aside from these, Google’s July Android security bulletin highlights yet another critical vulnerability, CVE-2023-21250, affecting the Android System part. This issue can cause remote code execution devoid of consumer interaction or supplemental execution privileges, earning it specifically precarious.

These security updates are rolled out in two patch stages. The preliminary patch amount, created readily available on July 1, focuses on main Android elements, addressing 22 security flaws in the Framework and Method components.

Impending WEBINAR🔐 Privileged Obtain Management: Study How to Conquer Important Troubles

Explore unique methods to conquer Privileged Account Management (PAM) issues and stage up your privileged access security method.

Reserve Your Spot

The next patch stage, released on July 5, targets kernel and closed resource factors, tackling 20 vulnerabilities in Kernel, Arm, Creativeness Systems, MediaTek, and Qualcomm factors.

It’s significant to take note that the influence of the resolved vulnerabilities may well extend past the supported Android versions (11, 12, and 13), likely affecting more mature OS versions no for a longer time obtain official help.

Google has more introduced certain security patches for its Pixel products, dealing with 14 vulnerabilities in Kernel, Pixel, and Qualcomm components. Two of these critical weaknesses could outcome in privilege elevation and denial-of-provider attacks.

Discovered this short article attention-grabbing? Comply with us on Twitter  and LinkedIn to read through much more special material we post.


Some pieces of this report are sourced from:
thehackernews.com

Previous Post: «jumpcloud resets api keys amid ongoing cybersecurity incident JumpCloud Resets API Keys Amid Ongoing Cybersecurity Incident
Next Post: BlackByte 2.0 Ransomware: Infiltrate, Encrypt, and Extort in Just 5 Days blackbyte 2.0 ransomware: infiltrate, encrypt, and extort in just 5»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.