Skip to main content

Critical vulnerabilities on Android allows you to unlock the root privileges: Incoming fix

Software that allows you to unlock root permissions of an Android smartphone, and then obtain full control, uses a longstanding vulnerability still not correct Linux kernel on Android. The bug was in fact placed on Linux to April 2014 but has not been marked as vulnerable until February 2015. The community began to differentiate it with the identifier CVE-2015-1805, but despite this, the fix was not built on Android, the mobile OS based on Linux known.

It was last February 19 that a group of researchers known as c0re Team has made this Google that exploits the vulnerability of Android could be delivered to the user and, above all, for an attacker can gain root privileges inside the device. Google promptly answered the call of the security team starting to work on a patch whose release is planned for an upcoming monthly updates.

On 15 March, another computer security company, Zimperium, had notified Google that the vulnerability had been actively exploited to ensure root permissions on your Android device. Although this is a feature often required by the most demanding users, "rootare" a smartphone or a tablet translates parallel in removing certain security restrictions, granting third-party apps to have full control on the same device.

The release of root permissions is a widely sought after by the so-called practical enthusiast users to have maximum control over your smartphone, but at the same time it is a usable freedom even from malicious software to take root in the operating system and strike extremely sensitive system files . Precisely why Google does not officially condone and will not allow the publication of app to perform the procedure within the Google Play store.

"Google has confirmed the existence of an app rooting publicly available abusing this vulnerability on Nexus 5 and Nexus 6 to provide the user with root privileges," he wrote the company publicly within a safety note released recently. Although the software itself is not marked as malicious, there is a serious risk of infection for the above devices. An attacker can in fact take advantage of the bug to spread malware.

Google has already released a patch for this vulnerability to manufacturers of third-party devices and also published on the Android Open Source Project (AOSP) for versions 3.4, 3.10, 3.14 Android kernel, while the version 3.18 onwards, the vulnerability is not this. The company has already planned to include the fixes in security updates for Nexus devices of next April. Until then the company recommends users to download applications only from Google Play and keep the current setting Verify Apps. The devices marked with a security patch level of the March 18, 2016 or later are already protected.

Comments

Popular posts from this blog

Apple’s AI Push: Everything We Know About Apple Intelligence So Far

Apple’s WWDC 2025 confirmed what many suspected: Apple is finally making a serious leap into artificial intelligence. Dubbed “Apple Intelligence,” the suite of AI-powered tools, enhancements, and integrations marks the company’s biggest software evolution in a decade. But unlike competitors racing to plug AI into everything, Apple is taking a slower, more deliberate approach — one rooted in privacy, on-device processing, and ecosystem synergy. If you’re wondering what Apple Intelligence actually is, how it works, and what it means for your iPhone, iPad, or Mac, you’re in the right place. This article breaks it all down.   What Is Apple Intelligence? Let’s get the terminology clear first. Apple Intelligence isn’t a product — it’s a platform. It’s not just a chatbot. It’s a system-wide integration of generative AI, machine learning, and personal context awareness, embedded across Apple’s OS platforms. Think of it as a foundational AI layer stitched into iOS 18, iPadOS 18, and m...

The Silent Revolution of On-Device AI: Why the Cloud Is No Longer King

Introduction For years, artificial intelligence has meant one thing: the cloud. Whether you’re asking ChatGPT a question, editing a photo with AI tools, or getting recommendations on Netflix — those decisions happen on distant servers, not your device. But that’s changing. Thanks to major advances in silicon, model compression, and memory architecture, AI is quietly migrating from giant data centres to the palm of your hand. Your phone, your laptop, your smartwatch — all are becoming AI engines in their own right. It’s a shift that redefines not just how AI works, but who controls it, how private it is, and what it can do for you. This article explores the rise of on-device AI — how it works, why it matters, and why the cloud’s days as the centre of the AI universe might be numbered. What Is On-Device AI? On-device AI refers to machine learning models that run locally on your smartphone, tablet, laptop, or edge device — without needing constant access to the cloud. In practi...

Max Q: Psyche(d)

In this issue: SpaceX launches NASA asteroid mission, news from Relativity Space and more. © 2023 TechCrunch. All rights reserved. For personal use only. from TechCrunch https://ift.tt/h6Kjrde via IFTTT