Results 1 to 2 of 2
Like Tree1Likes
  • 1 Post By ArchonAdvisors
  1. #2  
    Google's default Messenger SMS app was apparently the conduit through which the vulnerability could be exploited. Google planned on updating that app (they may have already) so that it does not autoload video code like it was doing before. You can check for that update in the play store.

    Google's lead Android security engineer, Adrian Ludwig, answered in an interview that the ASLR (Address Space Layout Randomization) mechanism in Android 4.0 and up also effectively protects against an attack otherwise attempted using the libStageFright vulnerability. CM9 is based on Android 4.0 so the same should apply.

    It wouldn't seem too hard to get a patch into CM9, but if a StageFright patch is not released for CM9, however, it's not as bad as it may sound.
    scjjtt likes this.

Similar Threads

  1. LG 2015 TV "Good Chance, Good Chance"
    By akitayo in forum LG webOS TV
    Replies: 0
    Last Post: 02/02/2015, 12:24 PM
  2. Replies: 2
    Last Post: 06/07/2013, 12:18 AM
  3. webOS 3.0.4 and Android Tenderloin Info
    By xiBeAsT28 in forum Android on webOS
    Replies: 0
    Last Post: 10/18/2011, 12:00 PM
  4. [Patch] Advanced Configuration Patches - Conflicting Patches List
    By oakridge outdoors in forum Enlightened Linux Solutions
    Replies: 6
    Last Post: 11/02/2010, 02:04 PM
  5. sconix patches vs Janne Julkunen patches
    By mu7efcer in forum webOS Patches
    Replies: 1
    Last Post: 05/19/2010, 05:27 PM

Tags for this Thread

Posting Permissions