Ore caldissime in casa Google, visto che per i Nexus fermi a Lollipop è stato rilasciato un aggiornamento utile a risolvere una serie di falle riguardanti la sicurezza. Chiaro il riferimento ad esempio al Nexus 4.
Questo lo schemino proposto:
Issue Description |
CVE |
Severity |
Remote Code Execution Vulnerabilities in libstagefright |
CVE-2015-3873, CVE-2015-3872, CVE-2015-3871, CVE-2015-3868, CVE-2015-3867, CVE-2015-3869, CVE-2015-3870, CVE-2015-3823, CVE-2015-6598, CVE-2015-6599, CVE-2015-6600, CVE-2015-3870, CVE-2015-6601, CVE-2015-3876, CVE-2015-6604 |
Critical |
Remote Code Execution Vulnerabilities in Sonivox |
CVE-2015-3874 |
Critical |
Remote Code Execution Vulnerabilities in libutils |
CVE-2015-3875, CVE-2015-6602 |
Critical |
Remote Code Execution Vulnerability in Skia |
CVE-2015-3877 |
Critical |
Remote Code Execution Vulnerability in libFLAC |
CVE-2014-9082 |
Critical |
Elevation of Privilege Vulnerability in KeyStore |
CVE-2015-3863 |
HIgh |
Elevation of Privilege Vulnerability in Media Player Framework |
CVE-2015-3879 |
High |
Elevation of Privilege Vulnerability in Android Runtime |
CVE-2015-3865 |
High |
Elevation of Privilege Vulnerabilities in Mediaserver |
CVE-2015-6596 |
High |
Elevation of Privilege Vulnerability in Secure Element Evaluation Kit |
CVE-2015-6606 |
High |
Elevation of Privilege Vulnerability in Media Projection |
CVE-2015-3878 |
Moderate |
Elevation of Privilege Vulnerability in Bluetooth |
CVE-2015-3847 |
Moderate |
Elevation of Privilege Vulnerabilities in SQLite |
CVE-2015-6607 |
Moderate |
Denial of Service Vulnerabilities in Mediaserver |
CVE-2015-6605 CVE-2015-3862 |
Low |
Non resta che attendere la notifica per procedere.