Samsung Promises to Patch ‘Dirty Pipe’ Vulnerability on Galaxy Devices Based on Android 12

Samsung has promised to launch safety updates for its Android 12-based Galaxy gadgets to handle the “Dirty Pipe” vulnerability. The very critical safety flaw was initially found within the Linux kernel. Nonetheless, since Android makes use of Linux kernel as its kernel, the vulnerability has impacted some Android 12 gadgets, together with Samsung Galaxy S22 collection in addition to Google Pixel 6 telephones. It may very well be exploited by a malicious app to permit attackers to learn and even manipulate encrypted content material and system recordsdata on an affected system.

In a press release to Devices 360, Samsung promised to patch the “Dirty Pipe” vulnerability on its gadgets.

“We have already worked to develop security patches on Android 12 Galaxy devices and will soon release security updates to address the issue,” the corporate mentioned. “We recommend that all users keep their devices up to date with the latest software to ensure the highest level of protection possible.”

The precise schedule for the updates and which gadgets will obtain them are but to be revealed.

The Linux kernel vulnerability was reported by safety researcher Max Kellermann. Tracked as CVE-2022-0847, the bug might permit attackers to realize system-level entry and overwrite information in system read-only recordsdata.

Kellermann had knowledgeable Devices 360 that whereas understanding the scope of the vulnerability on cell gadgets is unclear, it has affected at the least some Android 12 gadgets. The researcher was in a position to reproduce the bug on a Google Pixel 6.

Along with Pixel 6, the vulnerability might impression customers of the Samsung Galaxy S22, Galaxy S22+, and Galaxy S22 Extremely.

Google merged the bug repair given by Kellermann into the Android kernel after receiving his report in February. Nonetheless, it’s unclear whether or not a repair is ​​coming from the Android producer’s facet.

Within the meantime, customers are suggested to not set up apps from third-party sources and be sure that the newest safety patches are put in on their gadgets.

Leave a Reply

Your email address will not be published.