So no updates since August in the uk and google have released Jan updates this is what we are open to.
Highlights for January 2018
January 2018's update comes with two patch
dates: OI /Of /2018, and 01/05/2018.
January 2018's most severe vulnerability
addressed is a patch for the Android runtime
that could let an attacker gain access to
certain OS features without user interaction
Vulnerabilities that allowed code execution
through the Media Framework were patched,
like every month.
A vulnerability specific to the LG bootloader
that allowed elevated privileges was patched.
Life's Good, once again.
A vulnerability specific to the NVIDIA driver
that allowed elevated privileges was found
and fixed
Qualcomm provided a handful of closed-
source fixes in addition to patches for the
display driver and bootloader
If you get an update with a patch date of
Of /05/2018, you also have every issue addressed
by the OI /Of /2018 update in place.
Highlights for December 2017
December 2017's update comes with two patch
dates: 12/01 /2017, and 12/05/2017.
If your device didn't get updated to the
November 6 patch last month, December's
update also comes with a fix for the KRACK
WPA2 Wi-FI vulnerability.
A vulnerability with Android's framework that
allowed malicious apps to get past user
interactions requirements to access greater
permissions has been squashed.
The media framework has also been updated
to patch a threat that allowed a remote
attacker to send out an arbitrary code to your
device.
Components for numerous MediaTek,
NVIDIA, and Qualcomm components have
been updated with security fixes.
If you get an update with a patch date of
12/05/2017, you also have every issue addressed
by the 12/01 /2017 update in place. Highlights for November 2017
November 2017's update comes with three patch
dates: I I /Of /2017, 1 1 /05/2017 and 1 1 /06/2017.
This month's patch updates the network
stack to patch the KRACK Wi-FI exploit.
The Android framework has once again been
patched to prevent an exploit that bypass
user interaction requirements in order to gain
access to additional permissions.
The media framework and the Android
system itself were again patched to combat
the ever-present attacks through media
containers. This has been a monthly thing for
over a year and will certainly continue.
Critical updates were applied as far back as
Android 5.02 for OEMS to use to patch their
existing devices if they wish.
Broadcom, MediaTek, NVIDIA, and
Qualcomm have each patched a number of
drivers that could potentially allow remote
attackers to execute code.
If you get an update with a patch date of
l0/05/2017, you also have every issue addressed
by the l0/01/2017 update in place. Devices that
receive a patch with the 1 1 /06/201 7 date have all
the November fixes in place as well as all
previous patches. This is something new and
we're hopeful that it continues. Hlighlights for October 2017
)ctober 2017's update comes with two patch
dates: l0/01 /2017 and l0/05/2017.
This month's patch updates several critical
components to prevent privileged code
execution, both locally and remote.
The Android framework has been patched to
prevent an exploit that bypass user
interaction requirements in order to gain
access to additional permissions.
The media framework and the Android
system itself were patched to prevent
execute arbitrary code within the context of a
privileged process.
Critical updates were applied as far back as
Android 4.4
Broadcom, MediaTek, and Qualcomm have
each patched a number of drivers that could
potentially allow remote attackers to execute
code.
f you get an update with a patch date of
l0/05/2017, you also have every issue addressed
)y the l0/01 /2017 update in place. Highlights for September 2017
September 2017's update comes with two patch
dates: 09/01 /2017 and 09/05/2017.
The main issue this month revolves. once
again, around a vulnerability in the media
framework that, when paired with exploitative
code, could remotely execute malware on a
user's device.
Some of these patches go back to Android
4.4 KitKat.
A runtime bug has been patched that would
allow a remote user to execute code that
could cause an app to hang.
Broadcom has once again issued a number
of patches for its Wi-FI drivers.
MediaTek and Qualcomm have each patched
a number of drivers that could potentially
allow remote attackers to execute code.
If you get an update with a patch date of
09/05/2017, you also have every issue addressed
by the 09/01/2017 update in place.
Think our phones are a little bit to open
Highlights for January 2018
January 2018's update comes with two patch
dates: OI /Of /2018, and 01/05/2018.
January 2018's most severe vulnerability
addressed is a patch for the Android runtime
that could let an attacker gain access to
certain OS features without user interaction
Vulnerabilities that allowed code execution
through the Media Framework were patched,
like every month.
A vulnerability specific to the LG bootloader
that allowed elevated privileges was patched.
Life's Good, once again.
A vulnerability specific to the NVIDIA driver
that allowed elevated privileges was found
and fixed
Qualcomm provided a handful of closed-
source fixes in addition to patches for the
display driver and bootloader
If you get an update with a patch date of
Of /05/2018, you also have every issue addressed
by the OI /Of /2018 update in place.
Highlights for December 2017
December 2017's update comes with two patch
dates: 12/01 /2017, and 12/05/2017.
If your device didn't get updated to the
November 6 patch last month, December's
update also comes with a fix for the KRACK
WPA2 Wi-FI vulnerability.
A vulnerability with Android's framework that
allowed malicious apps to get past user
interactions requirements to access greater
permissions has been squashed.
The media framework has also been updated
to patch a threat that allowed a remote
attacker to send out an arbitrary code to your
device.
Components for numerous MediaTek,
NVIDIA, and Qualcomm components have
been updated with security fixes.
If you get an update with a patch date of
12/05/2017, you also have every issue addressed
by the 12/01 /2017 update in place. Highlights for November 2017
November 2017's update comes with three patch
dates: I I /Of /2017, 1 1 /05/2017 and 1 1 /06/2017.
This month's patch updates the network
stack to patch the KRACK Wi-FI exploit.
The Android framework has once again been
patched to prevent an exploit that bypass
user interaction requirements in order to gain
access to additional permissions.
The media framework and the Android
system itself were again patched to combat
the ever-present attacks through media
containers. This has been a monthly thing for
over a year and will certainly continue.
Critical updates were applied as far back as
Android 5.02 for OEMS to use to patch their
existing devices if they wish.
Broadcom, MediaTek, NVIDIA, and
Qualcomm have each patched a number of
drivers that could potentially allow remote
attackers to execute code.
If you get an update with a patch date of
l0/05/2017, you also have every issue addressed
by the l0/01/2017 update in place. Devices that
receive a patch with the 1 1 /06/201 7 date have all
the November fixes in place as well as all
previous patches. This is something new and
we're hopeful that it continues. Hlighlights for October 2017
)ctober 2017's update comes with two patch
dates: l0/01 /2017 and l0/05/2017.
This month's patch updates several critical
components to prevent privileged code
execution, both locally and remote.
The Android framework has been patched to
prevent an exploit that bypass user
interaction requirements in order to gain
access to additional permissions.
The media framework and the Android
system itself were patched to prevent
execute arbitrary code within the context of a
privileged process.
Critical updates were applied as far back as
Android 4.4
Broadcom, MediaTek, and Qualcomm have
each patched a number of drivers that could
potentially allow remote attackers to execute
code.
f you get an update with a patch date of
l0/05/2017, you also have every issue addressed
)y the l0/01 /2017 update in place. Highlights for September 2017
September 2017's update comes with two patch
dates: 09/01 /2017 and 09/05/2017.
The main issue this month revolves. once
again, around a vulnerability in the media
framework that, when paired with exploitative
code, could remotely execute malware on a
user's device.
Some of these patches go back to Android
4.4 KitKat.
A runtime bug has been patched that would
allow a remote user to execute code that
could cause an app to hang.
Broadcom has once again issued a number
of patches for its Wi-FI drivers.
MediaTek and Qualcomm have each patched
a number of drivers that could potentially
allow remote attackers to execute code.
If you get an update with a patch date of
09/05/2017, you also have every issue addressed
by the 09/01/2017 update in place.
Think our phones are a little bit to open