10 comments

  • charcircuit 1 hour ago
    >But in reality, Samsung (and the other Android OEMs) cannot compete with Google and its unique control over hardware and software.

    Yes, they can. We are talking about applying provided security patches to source code, and then releasing a new version of their OS. For patches that have existed for months. The time from patch to release should be on the order l of days from receiving the patches to having a validated OS release with the fix being sent to users. It's not the control of Android which makes Google possible to patch their Pixel branch of AOSP faster than Samsung can patch their own. It's that Samsung doesn't care about prompt security fixes so they don't allocate engineers to do the work.

    • kwanbix 28 minutes ago
      The problem is that each OEM releases 50 different models per year, vs Google (or Apple) that release 3 or 4 models.
      • shiandow 18 minutes ago
        If that truly is an issue then Android is a fundamentally broken OS.

        How many different models of PCs get released? How hard is it to patch any of their OSs?

      • klooney 3 minutes ago
        The fix was released in September according to GrapheneOS, so you'd think they could have it out for the flagships
    • jacquesm 8 minutes ago
      And then you install that 'security patch' and end up with a borked phone, apps that no longer work, new apps that you didn't ask for and so on.

      Give me just the security updates please.

  • xnx 1 hour ago
    No fix yet for Samsung. Being reliant on the hardware manufacturer (or network operator?) for OS updates is the crazy world we live in.
    • bigbadfeline 56 minutes ago
      > Being reliant on the hardware manufacturer (or network operator?) for OS updates is the crazy world we live in.

      Being reliant on a single OS permanently nailed to the hardware is no less crazier. I'd like to be able to install another OS on a vulnerable device, it would help tremendously and not only with the security of that specific device.

      Now I've got some expensive paperweights that I can't even use as such because every time I see them I have the urge to throw them in the trash can.

      Provide a way to unlock the phones and a standard BSP, it should be the law.

      • edoceo 16 minutes ago
        Please try to e-recycle rather than normal land-fill trash.
    • ChocolateGod 1 hour ago
      I hoped with a move to Fuschia, Google would attempt to fix this, but unfortunately Fuschia on mobile is dead.
      • shwaj 43 minutes ago
        It’s “Fuchsia” with a “chs” not a “sch”. Where do you get your information that it’s dead?
        • jcranmer 26 minutes ago
          As Randall Munroe pointed out in https://blog.xkcd.com/2010/05/03/color-survey-results/, almost nobody knows how to spell "fuchsia" correctly. I only remember it by the mnemonic of it's fuck, but with an s.
          • crazygringo 18 minutes ago
            I vote to just change the spelling to what almost everyone already thinks it is anyways.

            It'll still be just as weird. But "chs" is just nonsensical. The idea that it would sound like "sh" is baffling. I mean, I know this is English spelling which is not known for its regularity, but this is just too much.

  • kelnos 1 hour ago
    > This [update] was rushed out to all Pixel users.

    Pixel 8 here, still don't have the update. That's... not great.

    • nervysnail 50 minutes ago
      I'd suggest you to use GrapheneOS.
    • jeffbee 31 minutes ago
      Just go to the software update, touch the button, then touch it a second time, and that will give you all available updates immediately, regardless of your random position in the rollout process.
      • Terr_ 15 minutes ago
        Not working for me on Android 16, additional taps of the "Check for update" button in the bottom-right don't change the fact that it says "Your system is up to date" and that the last change was last month.
        • jeffbee 7 minutes ago
          Could be model-specific. I got the update by doing that manually on my Pixel 8 Pro, that also happens to be on the beta track so there are a few confounders. But that is the way to get the latest software that is waiting to be released to your phone, without waiting.
  • baal80spam 1 hour ago
    This requires user action, right? User needs to install the APK by hand? In other words - if I don't install any crap on my phone I am safe?
    • bigbadfeline 41 minutes ago
      > if I don't install any crap on my phone I am safe?

      We don't know. Practically no technical information is released about the bug, for what I care any play store app may exploit this at one time or another and there's no way to know. It's not like everyone and their CFO are shy of exploiting any user data they can get their greedy hands on.

  • Squeeze2664 1 hour ago
    Is GrapheneOS affected?
  • rew0rk 1 hour ago
    While the information leakage/disclosure is a big issue, It feels like its still a big jump to get users to install off-Play Store APKs?
  • resist_futility 1 hour ago
    nice list of vulnerabilities and source changes

    https://source.android.com/docs/security/bulletin/2025-12-01

  • baaron 1 hour ago
    My tinfoil hat might be on too tight again... but the timing of this exploit coinciding with Google's full court press on Android user rights is just a little suspect. Especially after the ongoing public education campaign about the evils of "sideloading" an Android application.
  • domoregood 1 hour ago
  • purplehat_ 1 hour ago
    [flagged]
    • charcircuit 48 minutes ago
      This isn't accurate and is just an AI hallucination.
    • barrkel 38 minutes ago
      Look here: https://vulert.com/vuln-db/CVE-2025-48633

      It has to do with setting the device owner, and gaining those powers; enabling / disabling apps, remote wipe, etc.. It's a local privilege escalation attack and doesn't require user interaction.

    • weberer 29 minutes ago
      What did you use to make that chart? It looks really nice. Its the first time I've see these ASCII boxes on HN without gaps in the border.
    • pogue 1 hour ago
      So it sounds like if you don't sideload apps you would not be at risk, correct?
      • gpm 34 minutes ago
        I suspect the average person who installs apps outside of the play store is still much more likely to be infected via malware that dodged the playstore's detection than the apps they install from other sources, because there's usually considerable trust involved with the other sources.

        In particular they're usually f-droid and open source apps compiled by f-droid.

    • 4ndrewl 1 hour ago
      Conveniently Google can use this to justify banning installs from unofficial stores.
    • nutjob2 1 hour ago
      > The Forbes link unfortunately doesn't say much about how it works.

      True, it says almost nothing of value about the exploit, but it does teach us that 30% is almost one in three.

    • da_grift_shift 59 minutes ago
      Is this guy going to make a slop repo for every new CVE in a high-profile product advisory so he can rack up some stars and put this shit on his resume? Jesus fuck.

      This is just polluting the namespace and making it harder for blue teamers and incident responders to share IOCs.

      His repos either lack a PoC and just contain a README with more emojis than facts; try to pass a public version checker off as a PoC; or invent a non-working PoC in the absence of technical details.

      Bullshit asymmetry.