Multiple vulnerabilities were identified in Google Android OS. A remote attacker could exploit some of these vulnerabilities to trigger denial of service condition, privilege escalation and sensitive information disclosure on the targeted system.
Multiple vulnerabilities have been discovered in Google Android OS, the most severe of which could allow for privilege escalation. Depending on the privileges associated with the exploited component, an attacker could then install programs; view, change, or delete data; or create new accounts with full rights.
Before installation of the software, please visit the software vendor web-site for more details.
The information provided herein is on an “as is” basis, without warranty of any kind.