Google Announces Android Partner Vulnerability Initiative
Google on Friday announced the Android Partner Vulnerability Initiative (APVI), an effort aimed at improving patching of security issues specific to Android OEMs.
Through the new initiative, the tech giant also expects to improve transparency around vulnerabilities identified by Google’s own researchers, but which impact device models coming from the company’s Android partners.
Google already provides security researchers with various programs through which they can report security issues, such as the Android Security Rewards Program (ASR), which is for reporting vulnerabilities in Android code, and the Google Play Security Rewards Program, for reporting bugs in popular third-party Android apps.
ASR reports that have a broad impact on Android-based devices are delivered to the Android Open Source Project (AOSP) base code, as part of the Android Security Bulletins (ASB), and all partners are required to adopt these security changes for their devices in order to be able to declare a specific month’s Android security patch level (SPL).
“But until recently, we didn’t have a clear way to process Google-discovered security issues outside of AOSP code that are unique to a much smaller set of specific Android OEMs. The APVI aims to close this gap, adding another layer of security for this targeted set of Android OEMs,” Google explains.
All issues discovered within Google and which could potentially impact the security of an Android device are covered by the APVI. A variety of security bugs affecting code not maintained by Google are included here, the company says.
The initiative has already kicked off and various types of security issues have been processed, including permission bypass, code execution within the kernel, leak of credentials, and the generation of unencrypted backups.
As part of the program, Google-discovered vulnerabilities will be publicly disclosed on Google’s Chromium portal. Detailed information on issues that have already been disclosed is also found there.