Technology

Samsung Galaxy Devices to Get a Patch for ‘Dirty Pipe’ Vulnerability

Samsung has promised to launch stability updates for its Galaxy gadgets centered on Android 12 to deal with the ‘Dirty Pipe’ vulnerability. The highly extreme safety flaw was in the beginning found in the Linux kernel. Even so, because Android uses the Linux kernel as a core, the vulnerability has been impacting some Android 12 equipment, which includes the Samsung Galaxy S22 series as perfectly as the Google Pixel 6 telephones. It could be exploited by a destructive app to permit attackers go through and manipulate even encrypted content and process documents on an affected machine.

In a assertion to Gizmos 360, Samsung promised to patch the ‘Dirty Pipe’ vulnerability on its devices.

“We have by now labored to establish security patches on Galaxy units of Android 12 and will release safety updates to handle the challenge shortly,” the company mentioned. “We endorse that all buyers preserve their devices updated with the latest application to ensure the highest amount of safety achievable.”

Precise timeline on the updates and which devices will get them are not yet uncovered.

The Linux kernel vulnerability was brought into discover by stability researcher Max Kellermann. Tracked as CVE-2022-0847, the bug could enable attackers to acquire procedure-degree obtain and overwrite information in browse-only information on the procedure.

Kellermann had informed Gizmos 360 that although comprehending the scope of the vulnerability on mobile devices is not clear, it has impacted at the very least some Android 12 devices. The researcher was capable to reproduce the bug on a Google Pixel 6.

In addition to the Pixel 6, the vulnerability could affect users on the Samsung Galaxy S22, Galaxy S22+, and the Galaxy S22 Extremely.

Google merged the bug fix supplied by Kellermann into the Android kernel right after acquiring its report in February. Having said that, it is unclear whether a fix is coming from the Android-maker aspect.

Consumers are, in the meantime, advisable to not put in applications from any 3rd-party resources and make positive to have the most current stability patches mounted on their equipment.


Source website link

Related Articles

Leave a Reply

Your email address will not be published.

Back to top button