Comment Re:Security updates (Score 1) 17
Well, that is the thing.
Check Android October's 2022 security bulletin report: https://source.android.com/doc...
Let's look at CVE-2022-25718 under Qualcomm closed-source components.
Then Google that CVE and you get, https://cve.mitre.org/cgi-bin/...
which states:
Cryptographic issue in WLAN due to improper check on return value while authentication handshake in Snapdragon Auto, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking
Then go to the QC relevant bulletin to find the CVE: https://docs.qualcomm.com/prod...
And you will see that it falls under Proprietary Software Issue, and there is no patch available. So the all device with affected component running code earlier than the one stated has a known public vulnerability.
How does it help to have driver portability? or to have latest Android?
Check Android October's 2022 security bulletin report: https://source.android.com/doc...
Let's look at CVE-2022-25718 under Qualcomm closed-source components.
Then Google that CVE and you get, https://cve.mitre.org/cgi-bin/...
which states:
Cryptographic issue in WLAN due to improper check on return value while authentication handshake in Snapdragon Auto, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon IoT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables, Snapdragon Wired Infrastructure and Networking
Then go to the QC relevant bulletin to find the CVE: https://docs.qualcomm.com/prod...
And you will see that it falls under Proprietary Software Issue, and there is no patch available. So the all device with affected component running code earlier than the one stated has a known public vulnerability.
How does it help to have driver portability? or to have latest Android?