Project Zero Flags 'Patch Gap' Problems on Android


Vulnerability researchers at Google Project Zero are calling attention to the ongoing “patch-gap” problem in the Android ecosystem, warning that downstream vendors continue to be tardy at delivering security fixes to Android-powered devices.

Vulnerability researchers at Google Project Zero are calling attention to the ongoing “patch-gap” problem in the Android ecosystem, warning that downstream vendors continue to be tardy at delivering security fixes to Android-powered devices.

In a research note documenting the discovery of an in-the-wild Android exploit targeting a flaw in the ARM Mali GPU driver, Project Zero hacker Ian Beer said security updates available since August 2022 have still not been pushed to affected Android devices.

Beer identified his own company’s Pixel alongside devices from Samsung, Xiaomi and Oppo that remain exposed to exploitable software vulnerabilities that have been publicly known for several months.

Beer said Project Zero initiated a security audit of the ARM Mali GPU driver after watching an internal presentation ahead of Maddie Stone’s FirstCon22 speech that described in-the-wild exploitation of low-level memory management code used in millions of Android devices. 

[ READ: Microsoft Finds Major Flaws in Pre-Installed Android Apps ]

In the course of a few weeks, Beer said his team discovered five additional exploitable vulnerabilities in the ARM code, warning that memory safety issues could lead to code execution and permissions model bypass attacks.

“We reported these five issues to ARM when they were discovered between June and July 2022. ARM fixed the issues promptly in July and August 2022, disclosing them as security issues on their Arm Mali Driver Vulnerabilities page (assigning CVE-2022-36449) and publishing the patched driver source on their public developer website,” Beer explained.

In line with its disclosure policy, Project Zero waited an additional 30 days before going public with the discoveries.

“When time permits and as an additional check, we test the effectiveness of the patches that the vendor has provided. This sometimes leads to follow-up bug reports where a patch is incomplete or a variant is discovered and sometimes we discover the fix isn’t there at all,” Beer added.

[ READ: Mobile Platforms ’Actively Obstructing’ Zero-Day Research ]

In this case, he said Project Zero test devices that used Mali are still vulnerable to these issues.  “CVE-2022-36449 is not mentioned in any downstream security bulletins,” he declared.

“Just as users are recommended to patch as quickly as they can once a release containing security updates is available, so the same applies to vendors and companies. Minimizing the "patch gap" as a vendor in these scenarios is arguably more important, as end users (or other vendors downstream) are blocking on this action before they can receive the security benefits of the patch,” Beer added.

The Android and Pixel security teams say the fix provided by ARM is slated to be delivered “in the coming weeks.”

"The fix provided by ARM is currently undergoing testing for Android and Pixel devices and will be delivered in the coming weeks. Android OEM partners will be required to take the patch to comply with future SPL requirements," according to a bug-tracking update.


By Ryan Naraine on Mon, 28 Nov 2022 17:02:26 +0000
Original link