Google opublikowało grudniowy biuletyn bezpieczeństwa systemu Android, w którym zamieszczono poprawki do 42 podatności tego systemu, w tym 6 krytycznych.
CVE | Severity | Updated AOSP versions |
Framework | ||
CVE-2019-2232 | Critical | 8.0, 8.1, 9, 10 |
CVE-2019-9464 | High | 10 |
CVE-2019-2217 | High | 10 |
CVE-2019-2218 | High | 10 |
CVE-2019-2220 | High | 9, 10 |
CVE-2019-2221 | Moderate | 10 |
CVE-2019-2219 | High | 9, 10 |
Media framework | ||
CVE-2019-2202 | Moderate | 10 |
Critical | 8.0, 8.1, 9 | |
CVE-2019-2203 | Moderate | 10 |
Critical | 8.0, 8.1, 9 | |
System | ||
CVE-2019-2224 | High | 8.0, 8.1, 9, 10 |
CVE-2019-2225 | High | 8.0, 8.1, 9, 10 |
CVE-2019-2226 | High | 8.0, 8.1, 9, 10 |
CVE-2019-2227 | High | 9, 10 |
CVE-2019-2228 | High | 8.0, 8.1, 9, 10 |
CVE-2019-2229 | High | 8.0, 8.1, 9, 10 |
CVE-2019-2230 | High | 10 |
CVE-2019-2231 | High | 9, 10 |
CVE | Severity | Component |
Kernel components | ||
CVE-2018-20961 | High | USB MIDI class function driver |
CVE-2019-15220 | High | Prism54 WiFi USB Driver |
CVE-2019-15239 | High | TCP Stack |
Qualcomm components | ||
CVE-2019-10557 | High | WLAN host |
CVE-2018-11980 | High | WLAN host |
CVE-2019-10480 | High | WLAN host |
CVE-2019-10481 | High | WLAN host |
CVE-2019-10536 | High | WLAN host |
CVE-2019-10537 | High | WLAN host |
CVE-2019-10595 | High | WLAN host |
CVE-2019-10598 | High | WLAN host |
CVE-2019-10601 | High | WLAN host |
CVE-2019-10605 | High | WLAN host |
CVE-2019-10607 | High | Security |
CVE-2019-2304 | High | WLAN host |
Qualcomm closed-source components | ||
CVE-2019-2242 | Critical | Closed-source component |
CVE-2019-10500 | Critical | Closed-source component |
CVE-2019-10525 | Critical | Closed-source component |
CVE-2019-10482 | High | Closed-source component |
CVE-2019-10487 | High | Closed-source component |
CVE-2019-10516 | High | Closed-source component |
CVE-2019-2274 | High | Closed-source component |
CVE-2019-10513 | High | Closed-source component |
CVE-2019-10517 | High | Closed-source component |
CVE-2019-10600 | High | Closed-source component |
CERT PSE zachęca do zapoznania się z grudniowym biuletynem bezpieczeństwa Google Android i stosowanie aktualizacji dostarczanych przez poszczególnych producentów urządzeń.