Samsung Promises to Patch ‘Dirty Pipe’ Vulnerability on Galaxy Devices Based on Android 12

Samsung has promised to launch safety updates for its Galaxy units based mostly on Android 12 to tackle the ‘Dirty Pipe’ vulnerability. The extremely extreme safety flaw was initially found within the Linux kernel. Nonetheless, since Android makes use of the Linux kernel as a core, the vulnerability has been impacting some Android 12 units, together with the Samsung Galaxy S22 sequence in addition to the Google Pixel 6 telephones. It may very well be exploited by a malicious app to let attackers learn and manipulate even encrypted content material and system recordsdata on an affected gadget.

In a press release to Devices 360, Samsung promised to patch the ‘Dirty Pipe’ vulnerability on its units.

“We have already worked to develop security patches on Galaxy devices of Android 12 and will release security updates to address the issue soon,” the corporate stated. “We recommend that all users keep their devices updated with the latest software to ensure the highest level of protection possible.”

Actual timeline on the updates and which units will get them are usually not but revealed.

The Linux kernel vulnerability was brought into notice by safety researcher Max Kellermann. Tracked as CVE-2022-0847, the bug may enable attackers to achieve system-level entry and overwrite knowledge in read-only recordsdata on the system.

Kellermann had knowledgeable Devices 360 that whereas understanding the scope of the vulnerability on cell units shouldn’t be clear, it has affected not less than some Android 12 units. The researcher was ready to reproduce the bug on a (*12*).

As well as to the Pixel 6, the vulnerability may influence customers on the Samsung Galaxy S22, Galaxy S22+, and the Galaxy S22 Ultra.

Google merged the bug repair given by Kellermann into the Android kernel after receiving its report in February. Nonetheless, it’s unclear whether or not a repair is coming from the Android-maker facet.

Customers are, within the meantime, really helpful to not set up apps from any third-party sources and ensure to have the most recent safety patches put in on their units.

Source link

Leave a Reply

Your email address will not be published.