Rocksolid Light

News from da outaworlds

mail  files  register  groups  login

Message-ID:  

Today is what happened to yesterday.


comp / comp.mobile.android / Re: Qualcomm firmware patches 64 Android SOCs

SubjectAuthor
* Qualcomm firmware patches 64 Android SOCsGelato
+* Re: Qualcomm firmware patches 64 Android SOCsArno Welzel
|`* Re: Qualcomm firmware patches 64 Android SOCsAndy Burns
| +- Re: Qualcomm firmware patches 64 Android SOCsBill Powell
| `* Re: Qualcomm firmware patches 64 Android SOCsArno Welzel
|  `* Re: Qualcomm firmware patches 64 Android SOCsFrank Slootweg
|   `- Re: Qualcomm firmware patches 64 Android SOCsAndrews
`- Re: Qualcomm firmware patches 64 Android SOCsAndy Burns

1
Subject: Qualcomm firmware patches 64 Android SOCs
From: Gelato
Newsgroups: comp.mobile.android
Organization: <http://pasdenom.info/news.html>
Date: Sun, 13 Oct 2024 06:48 UTC
Path: eternal-september.org!news.eternal-september.org!feeder3.eternal-september.org!news.gegeweb.eu!gegeweb.org!pasdenom.info!.POSTED.public-nat-07.vpngate.v4.open.ad.jp!not-for-mail
From: gelato@.is.invalid (Gelato)
Newsgroups: comp.mobile.android
Subject: Qualcomm firmware patches 64 Android SOCs
Date: Sun, 13 Oct 2024 02:48:33 -0400
Organization: <http://pasdenom.info/news.html>
Message-ID: <vefqg5$ou7$1@rasp.pasdenom.info>
Injection-Date: Sun, 13 Oct 2024 06:48:38 -0000 (UTC)
Injection-Info: rasp.pasdenom.info; posting-account="gelatiamenta@usenet"; posting-host="public-nat-07.vpngate.v4.open.ad.jp:219.100.37.239";
logging-data="25543"; mail-complaints-to="abuse@pasdenom.info"
User-Agent: tin/2.4.5-20201224 ("Glen Albyn") (Linux/5.10.19-200.fc33.x86_64 (x86_64))
Cancel-Lock: sha1:ChZL3ILTMVQPFu9oUUab8haQVMY= sha256:Iaykrt+m+RK2A5kfQS0/Wk52I0BXSWSWo+bIJU6qOzg=
sha1:oK50/dqoLTFvgEP4ZAcVoxPkVCs= sha256:Qstv+x41u5znxtlLuf9uGfyuf5DTBlvEVlw+GMav3kw=
View all headers

https://www.bleepingcomputer.com/news/security/qualcomm-patches-high-severity-zero-day-exploited-in-attacks/

How does Qualcomm patch these zero-day holes in their chipsets?
Does the company upload a firmware patch? Does the carrier? Google?

Subject: Re: Qualcomm firmware patches 64 Android SOCs
From: Arno Welzel
Newsgroups: comp.mobile.android
Date: Sun, 13 Oct 2024 09:20 UTC
References: 1
Path: eternal-september.org!news.eternal-september.org!feeder3.eternal-september.org!fu-berlin.de!uni-berlin.de!individual.net!not-for-mail
From: usenet@arnowelzel.de (Arno Welzel)
Newsgroups: comp.mobile.android
Subject: Re: Qualcomm firmware patches 64 Android SOCs
Date: Sun, 13 Oct 2024 11:20:04 +0200
Lines: 15
Message-ID: <ln1hm3Fj0hnU1@mid.individual.net>
References: <vefqg5$ou7$1@rasp.pasdenom.info>
Mime-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-Trace: individual.net T6CFJwM8LPxI2AxUdPn5nwzo7/qzFA6lit3Aa4WyIMKQiWEjdV
Cancel-Lock: sha1:1giHjIUenM1TJ59KLJdaQ9wXK9Y= sha256:4BajLS5MSrNqQ9WuxR14fCmE/lE7+ZfPkEmR34uyIbM=
Content-Language: de-DE
In-Reply-To: <vefqg5$ou7$1@rasp.pasdenom.info>
View all headers

Gelato, 2024-10-13 08:48:

> https://www.bleepingcomputer.com/news/security/qualcomm-patches-high-severity-zero-day-exploited-in-attacks/
>
> How does Qualcomm patch these zero-day holes in their chipsets?
> Does the company upload a firmware patch? Does the carrier? Google?

Qualcomm provides software patches for the drivers.

Device manufacturers have to use these patches as part of a security
update if they use the affected chipsets in their devices.

--
Arno Welzel
https://arnowelzel.de

Subject: Re: Qualcomm firmware patches 64 Android SOCs
From: Andy Burns
Newsgroups: comp.mobile.android
Date: Sun, 13 Oct 2024 09:46 UTC
References: 1 2
Path: eternal-september.org!news.eternal-september.org!feeder3.eternal-september.org!fu-berlin.de!uni-berlin.de!individual.net!not-for-mail
From: usenet@andyburns.uk (Andy Burns)
Newsgroups: comp.mobile.android
Subject: Re: Qualcomm firmware patches 64 Android SOCs
Date: Sun, 13 Oct 2024 10:46:40 +0100
Lines: 15
Message-ID: <ln1j83FjhjaU2@mid.individual.net>
References: <vefqg5$ou7$1@rasp.pasdenom.info>
<ln1hm3Fj0hnU1@mid.individual.net>
Mime-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
X-Trace: individual.net QhTwnzNbLGcjDCSOKBs0hQgZJJ4Fd/w6OYVaPek32iB1Kd2FFr
Cancel-Lock: sha1:jMpzjtFXsgDL/Luro0zRRpocehQ= sha256:hgRz4OP/kQ7M3fiJh4cT8r94vKzTjJouAytD79Tq79Y=
User-Agent: Mozilla Thunderbird
Content-Language: en-GB
In-Reply-To: <ln1hm3Fj0hnU1@mid.individual.net>
View all headers

Arno Welzel wrote:

> Gelato wrote:
>
>> https://www.bleepingcomputer.com/news/security/qualcomm-patches-high-severity-zero-day-exploited-in-attacks/
>>
>> How does Qualcomm patch these zero-day holes in their chipsets?
>> Does the company upload a firmware patch? Does the carrier? Google?
>
> Qualcomm provides software patches for the drivers.
>
> Device manufacturers have to use these patches as part of a security
> update if they use the affected chipsets in their devices.
It isn't crystal clear whether google play system updates can provide
this type of fix, bypassing the manufacturer ...

Subject: Re: Qualcomm firmware patches 64 Android SOCs
From: Bill Powell
Newsgroups: comp.mobile.android
Organization: Hispagatos.org
Date: Sun, 13 Oct 2024 13:46 UTC
References: 1 2 3
Path: eternal-september.org!news.eternal-september.org!feeder3.eternal-september.org!news.hispagatos.org!.POSTED!not-for-mail
From: bill@anarchists.org (Bill Powell)
Newsgroups: comp.mobile.android
Subject: Re: Qualcomm firmware patches 64 Android SOCs
Date: Sun, 13 Oct 2024 15:46:41 +0200
Organization: Hispagatos.org
Message-ID: <vegj07$19n9l$1@matrix.hispagatos.org>
References: <vefqg5$ou7$1@rasp.pasdenom.info> <ln1hm3Fj0hnU1@mid.individual.net> <ln1j83FjhjaU2@mid.individual.net>
MIME-Version: 1.0
Content-Type: text/plain; charset="iso-8859-15"; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Date: Sun, 13 Oct 2024 13:46:47 -0000 (UTC)
Injection-Info: matrix.hispagatos.org;
logging-data="1367349"; mail-complaints-to="abuse@hispagatos.org"
User-Agent: XanaNews/1.19.1.372 (x86; Portable ISpell)
View all headers

On Sun, 13 Oct 2024 10:46:40 +0100, Andy Burns wrote:

> Arno Welzel wrote:
>
>> Gelato wrote:
>>
>>> https://www.bleepingcomputer.com/news/security/qualcomm-patches-high-severity-zero-day-exploited-in-attacks/
>>>
>>> How does Qualcomm patch these zero-day holes in their chipsets?
>>> Does the company upload a firmware patch? Does the carrier? Google?
>>
>> Qualcomm provides software patches for the drivers.
>>
>> Device manufacturers have to use these patches as part of a security
>> update if they use the affected chipsets in their devices.
>
> It isn't crystal clear whether google play system updates can provide
> this type of fix, bypassing the manufacturer ...

It that's the case, it bypasses both the carrier & manufacturer.

I tried to look it up but what I found mostly was an old (defunct?)
amorphous project from 2020 called treble, which doesn't say much.
https://www.qualcomm.com/news/releases/2020/12/qualcomm-and-google-announce-collaboration-extend-android-os-support-and

This person implies it's an OS release by the phone's vendor but he could
be wrong as his question applies to a prior August update & not this one.
https://forum.sailfishos.org/t/how-are-firmware-updates-for-the-phone-hardware-are-done/1571

Whatever method Qualcomm used to update Android chipset firmware, it seems
that the method used today will change later this year based on this.
https://timesofindia.indiatimes.com/technology/mobiles-tabs/this-is-how-qualcomm-plans-to-make-android-updates-easier-and-faster/articleshow/111402161.cms

More than one article echoed the sentiment that firmware updates lack
clarity in how they're being done between Qualcomm and the user's phone.
https://www.androidpolice.com/qualcomm-teases-announcement-easier-android-updates/

Subject: Re: Qualcomm firmware patches 64 Android SOCs
From: Arno Welzel
Newsgroups: comp.mobile.android
Date: Sun, 13 Oct 2024 17:15 UTC
References: 1 2 3
Path: eternal-september.org!news.eternal-september.org!feeder3.eternal-september.org!fu-berlin.de!uni-berlin.de!individual.net!not-for-mail
From: usenet@arnowelzel.de (Arno Welzel)
Newsgroups: comp.mobile.android
Subject: Re: Qualcomm firmware patches 64 Android SOCs
Date: Sun, 13 Oct 2024 19:15:24 +0200
Lines: 24
Message-ID: <ln2dhcFng2tU1@mid.individual.net>
References: <vefqg5$ou7$1@rasp.pasdenom.info>
<ln1hm3Fj0hnU1@mid.individual.net> <ln1j83FjhjaU2@mid.individual.net>
Mime-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
X-Trace: individual.net 1uWPS96Wd7zLmcs7JhkoowgvHi5CmcXeRllLDna3ODnpvUglxd
Cancel-Lock: sha1:gBXaZ6OXScmUDSupUoW+vGiRSeI= sha256:1Y26LYcAUGiPhJGYmpPuTyt3DwBDvC0WSFuX63mP/QQ=
Content-Language: de-DE
In-Reply-To: <ln1j83FjhjaU2@mid.individual.net>
View all headers

Andy Burns, 2024-10-13 11:46:

> Arno Welzel wrote:
>
>> Gelato wrote:
>>
>>> https://www.bleepingcomputer.com/news/security/qualcomm-patches-high-severity-zero-day-exploited-in-attacks/
>>>
>>> How does Qualcomm patch these zero-day holes in their chipsets?
>>> Does the company upload a firmware patch? Does the carrier? Google?
>>
>> Qualcomm provides software patches for the drivers.
>>
>> Device manufacturers have to use these patches as part of a security
>> update if they use the affected chipsets in their devices.
> It isn't crystal clear whether google play system updates can provide
> this type of fix, bypassing the manufacturer ...

I doubt, that system drivers can be updates using Google Play services.
Usually this must be installed as an update of the installed system itself.

--
Arno Welzel
https://arnowelzel.de

Subject: Re: Qualcomm firmware patches 64 Android SOCs
From: Frank Slootweg
Newsgroups: comp.mobile.android
Organization: NOYB
Date: Sun, 13 Oct 2024 19:42 UTC
References: 1 2 3 4
Path: eternal-september.org!news.eternal-september.org!feeder3.eternal-september.org!fu-berlin.de!uni-berlin.de!individual.net!not-for-mail
From: this@ddress.is.invalid (Frank Slootweg)
Newsgroups: comp.mobile.android
Subject: Re: Qualcomm firmware patches 64 Android SOCs
Date: 13 Oct 2024 19:42:56 GMT
Organization: NOYB
Lines: 32
Message-ID: <vehesn.238.1@ID-201911.user.individual.net>
References: <vefqg5$ou7$1@rasp.pasdenom.info> <ln1hm3Fj0hnU1@mid.individual.net> <ln1j83FjhjaU2@mid.individual.net> <ln2dhcFng2tU1@mid.individual.net>
X-Trace: individual.net pITDeB66/eaWAbrOvX9nOAj4WrwLwvXuSbfn96gklqxYURHyYj
X-Orig-Path: not-for-mail
Cancel-Lock: sha1:fsgbQra1T2wuvNT+3rAnHinCLNs= sha256:N73X+NgB73DqGH18/Yc60QqfCCc3c06Z0sywObpcJE4=
User-Agent: tin/1.6.2-20030910 ("Pabbay") (UNIX) (CYGWIN_NT-10.0-WOW/2.8.0(0.309/5/3) (i686)) Hamster/2.0.2.2
View all headers

Arno Welzel <usenet@arnowelzel.de> wrote:
> Andy Burns, 2024-10-13 11:46:
>
> > Arno Welzel wrote:
> >
> >> Gelato wrote:
> >>
> >>> https://www.bleepingcomputer.com/news/security/qualcomm-patches-high-severity-zero-day-exploited-in-attacks/
> >>>
> >>> How does Qualcomm patch these zero-day holes in their chipsets?
> >>> Does the company upload a firmware patch? Does the carrier? Google?
> >>
> >> Qualcomm provides software patches for the drivers.
> >>
> >> Device manufacturers have to use these patches as part of a security
> >> update if they use the affected chipsets in their devices.
> > It isn't crystal clear whether google play system updates can provide
> > this type of fix, bypassing the manufacturer ...
>
> I doubt, that system drivers can be updates using Google Play services.
> Usually this must be installed as an update of the installed system itself.

Note that Andy said "Google Play system updates" (case corrections
mine), not "Google Play services". "Google Play services" is the
software framework, i.e. running code. "Google Play system updates"
(note *system* updates) are what is distributed, i.e. 'data' (containing
code). Two different animals.

Google Play system updates (re: Project Mainline) can update system
components. Not sure if that includes drivers, but for generic - not
vendor-specific - drivers, that should be possible, considering Android
is Linux-like under the hood.

Subject: Re: Qualcomm firmware patches 64 Android SOCs
From: Andrews
Newsgroups: comp.mobile.android
Organization: BWH Usenet Archive (https://usenet.blueworldhosting.com)
Date: Sun, 13 Oct 2024 23:35 UTC
References: 1 2 3 4 5
Path: eternal-september.org!news.eternal-september.org!feeder3.eternal-september.org!usenet.blueworldhosting.com!diablo1.usenet.blueworldhosting.com!nnrp.usenet.blueworldhosting.com!.POSTED!not-for-mail
From: andrews@spam.net (Andrews)
Newsgroups: comp.mobile.android
Subject: Re: Qualcomm firmware patches 64 Android SOCs
Date: Sun, 13 Oct 2024 23:35:14 -0000 (UTC)
Organization: BWH Usenet Archive (https://usenet.blueworldhosting.com)
Message-ID: <vehlfh$1dmi$1@nnrp.usenet.blueworldhosting.com>
References: <vefqg5$ou7$1@rasp.pasdenom.info> <ln1hm3Fj0hnU1@mid.individual.net> <ln1j83FjhjaU2@mid.individual.net> <ln2dhcFng2tU1@mid.individual.net> <vehesn.238.1@ID-201911.user.individual.net>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Date: Sun, 13 Oct 2024 23:35:14 -0000 (UTC)
Injection-Info: nnrp.usenet.blueworldhosting.com;
logging-data="46802"; mail-complaints-to="usenet@blueworldhosting.com"
User-Agent: PhoNews/3.13.3 (Android/13)
Cancel-Lock: sha1:lfzQKW2rkpOhYcQ0SCuGpMQ4QKA= sha256:UOM2E8obqB1M/QVWT233jf7am3pczmYzk+kbBmlA1F0=
sha1:YGGVRX1O2Gxm9vxquiw/7FDbEIc= sha256:Wbsu6v3QPMrdAbjLUrBnR0nvJqf/k1DwiQTEdt9lswg=
View all headers

Frank Slootweg wrote on 13 Oct 2024 19:42:56 GMT :

>>>> Device manufacturers have to use these patches as part of a security
>>>> update if they use the affected chipsets in their devices.
>>> It isn't crystal clear whether google play system updates can provide
>>> this type of fix, bypassing the manufacturer ...
>>
>> I doubt, that system drivers can be updates using Google Play services.
>> Usually this must be installed as an update of the installed system itself.
>
> Note that Andy said "Google Play system updates" (case corrections
> mine), not "Google Play services". "Google Play services" is the
> software framework, i.e. running code. "Google Play system updates"
> (note *system* updates) are what is distributed, i.e. 'data' (containing
> code). Two different animals.

To his credit, Frank Slootweg is consistently one of the few people on this
newsgroup who have a grasp of the difference in details, especially given
Google marketing names almost everything "Google Play 'something'" due to
inherent brand recognition that marketeers love to employ.

Here is more about Android 15 Project Mainline (i.e., GP "system" updates).
<https://www.androidheadlines.com/2024/04/android-15-could-update-your-phones-nfc-stack-through-google-play.html>
"When an update to a Project Mainline module is available,
Google will push an update out to everybody through the
Google Play Store using a mechanism called Google Play System Updates.
Since Project Mainline modules are signed by Google, they can push out
updates to Mainline modules even on devices from other manufacturers."

Notice though that the case sensitivity was mashed up by the author of that
article as Frank has noted the naming & case differences quite nicely.

Unfortunately, nothing about Project Treble (firmware updates) is in that
article, although it says that there are about 40 modules in Android 15.
> Google Play system updates (re: Project Mainline) can update system
> components. Not sure if that includes drivers, but for generic - not
> vendor-specific - drivers, that should be possible, considering Android
> is Linux-like under the hood.

Notice this "might" be the mechanism which Qualcomm has been using.
<https://source.android.com/docs/core/ota/modular-system>

"Updated Mainline modules can be packaged together and pushed to
end-user devices, either by Google, using the Google Play system update
feature, or by the Android partner, using a partner-provided OTA
mechanism. The module package installs and rolls back atomically;
either all modules that need to be updated are updated or none
are updated."

Subject: Re: Qualcomm firmware patches 64 Android SOCs
From: Andy Burns
Newsgroups: comp.mobile.android
Date: Mon, 14 Oct 2024 08:11 UTC
References: 1
Path: eternal-september.org!news.eternal-september.org!feeder3.eternal-september.org!fu-berlin.de!uni-berlin.de!individual.net!not-for-mail
From: usenet@andyburns.uk (Andy Burns)
Newsgroups: comp.mobile.android
Subject: Re: Qualcomm firmware patches 64 Android SOCs
Date: Mon, 14 Oct 2024 09:11:01 +0100
Lines: 13
Message-ID: <ln420mFaelU1@mid.individual.net>
References: <vefqg5$ou7$1@rasp.pasdenom.info>
Mime-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 7bit
X-Trace: individual.net YnbZheEVUlnDjg63C81XrwGqbnc9eBW6xsSaf5o7m3aOxGV70k
Cancel-Lock: sha1:hAuovVZT6BwyBnIG8HPhRu6RdSw= sha256:HgbvmX8RWNeCupzQKRbVOHssBgK5T/l4iHlL3W0lBiE=
User-Agent: Mozilla Thunderbird
Content-Language: en-GB
In-Reply-To: <vefqg5$ou7$1@rasp.pasdenom.info>
View all headers

Gelato wrote:

> How does Qualcomm patch these zero-day holes in their chipsets?
> Does the company upload a firmware patch? Does the carrier? Google?

There are dozens of chipsets, with corresponding drivers

<https://docs.qualcomm.com/product/publicresources/securitybulletin/september-2024-bulletin.html>

I couldn't find any of the CVE numbers referred to in the system
updates, but maybe I was looking at recent Pixel specific fixes, and
those devices use Samsung derived SoC rather than Qualcomm?

1

rocksolid light 0.9.8
clearnet tor