44 Vulnerabilities Patched in Android With April 2022 Security Updates

The Android updates released by Google for April 2022 include patches for 44 vulnerabilities, including several rated “critical severity.”

As usual, the update was split into two parts, with the first of them arriving on devices as the “2022-04-01 security patch level” and addressing 14 security holes.

The most important of these is a high-severity bug in Framework that could be exploited to escalate privileges, without any form of user interaction. What’s more, no additional execution privileges are needed either, Google says in its advisory.

A total of seven vulnerabilities were resolved in the Framework component this month, all rated “high severity” and all leading to elevation of privilege.

[ READ: Android’s March 2022 Security Updates Patch 39 Vulnerabilities ]

The “2022-04-01 security patch level” also includes patches for two issues in Media framework and three in System. Additionally, two Google Play system updates resolve two vulnerabilities in MediaProvider and Media Codecs.

The second part of this month’s security update is rolling out to devices as the “2022-04-05 security patch level” and contains patches for no less than 30 vulnerabilities in System, Kernel components, MediaTek components, Qualcomm components, and Qualcomm closed-source components.

Nine of these vulnerabilities – all affecting Qualcomm components – are rated “critical,” while the remaining 21 have a “high severity” rating.

This month, Google also announced patches for a total of five vulnerabilities specific to Pixel devices. These impact Kernel components, Pixel, and Qualcomm components.

Related: Android’s February 2022 Security Updates Patch 36 Vulnerabilities

Related: ‘Xenomorph’ Android Trojan Targets 56 Banking Applications

Related: Google Introduces ‘Privacy Sandbox’ for ​​Ads on Android

view counter

Ionut Arghire is an international correspondent for SecurityWeek.

Previous Columns by Ionut Arghire:

Don't forget to share

You may also like...

Leave a Reply

Your email address will not be published. Required fields are marked *