• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

TNH Online

Disrupting the Disruptors

  • News
  • Tech
  • Games
  • Mobile
  • New Hampshire

February Security Update Comes With 58 Patched Android Vulnerabilities

TNH Staff · February 8, 2017 · Leave a Comment

Google has patched many security vulnerabilities in the latest February 2017 update, taking care of a new round of Stagefright flaws. The new Android patch update was released on February 6 and it fixed 58 different vulnerabilities, with 45 more than Google has patched in February 2016 Android update.

Eight vulnerabilities patched in the February 2017 update were rated as being critical and one of them is CVE-2017-0405, which could allow remote code execution in the Android Surfaceflinger graphics library, giving the attacker the freedom to use a use a “specially crafted file to cause memory corruption during media file and data processing” and Google has rated it as Critical “due to the possibility of remote code execution within the context of the Surfaceflinger process”.

Researchers Scott Bauer and Daniel Micay of Copperhead Security have discovered the Surfaceflinger issue in 2015. In October Micay has reported a another security flaw named Stagefright 2, but the original media server flaw was discovered in July 2015 and in August, Google started releasing monthly patches to fix security vulnerabilities.

There are four stagefright related vulnerabilities that have been patched in the February 2017 update, and two of them, CVE-2017-0406 and CVE-2017-0407, also rated as Critical, were remote code issues in mediaserver. Google has also patched two high severity issues, CVE-2017-0409 (in the libstagefright library) and CVE-2017-0415 (privilege escalation vulnerability in mediaserver). Google has explained that “An elevation of privilege vulnerability in the kernel file system could enable a local malicious application to execute arbitrary code within the context of the kernel” and “This issue is rated as Critical due to the possibility of a local permanent device compromise, which may require reflashing the operating system to repair the device.”

Another patched critical privilege escalation flaw is CVE-2014-9914, which is related to the kernel networking subsystem, and which Google has firstly fixed in 2014 in the upstream Linux kernel. Qualcomm had 19 flaws that have been patched in the February 2017 update, of which two were rated as Critical, two had a moderate severity and 15 were rated as high.

Filed Under: Software Tagged With: February Security, February Security Update, Google Security Update

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Share your news tips

Have a news tip or source related to New Hampshire you want us to check out? Here's how to let us know:

Email the The New Hampshire Online (TNH Online) at tip@tnhonline.com. Please include your name and phone number and a brief report of the tip. If possible, please attach any related documents to back up your story.

Recent Posts

  • Sonic Tomography: Unveiling the Hidden Health of Urban Trees
  • Sudden Oak Death: What Is It?
  • Terrazzo: The Timeless, Eco-Friendly Flooring Solution
  • Cool Alternative Games Like Slither.io
  • 10 Best Minecraft Mountain Seeds

Recent Comments

  • Dalice on Can You Really Use Google Play Credits to Buy on Amazon?
  • Dalice on Can You Really Use Google Play Credits to Buy on Amazon?
  • Carmen Leung on Can You Really Use Google Play Credits to Buy on Amazon?
  • Sol on Can You Really Use Google Play Credits to Buy on Amazon?
  • Mazhar on WhatsApp for Nokia Asha Currently Free to Download

Copyright © 2026 · Daily Dish Pro on Genesis Framework · WordPress · Log in