Select Page

I9506XXUDRB1 | Galaxy S4 GT-I9506 TPL Poland (T-Mobile)

I9506XXUDRB1 | Galaxy S4 GT-I9506 TPL Poland (T-Mobile)

You’re going to download the Samsung Galaxy S4 LTE-A (S800) GT-I9506 Firmware I9506XXUDRB1 Android 5.0.1 Lollipop from Yes Android Website.

Samsung is rolling out the August 2018 security update for the Galaxy S4 LTE-A (S800) based on Android 5.0.1 Lollipop, and you can download this Stock Firmware Update for your Galaxy S4 LTE-A (S800) here from the current page.

The August 2018 Security Patch Update brings fixes for some issues such as critical vulnerabilities that detected in the Android OS as well as scores of moderate-risk and high-risk vulnerabilities. You can check the details of the I9506XXUDRB1 August 2018 Security Update Changelog at the bottom of this page.

Download the firmware update for the Samsung Galaxy S4 LTE-A (S800) GT-I9506. Product Code for this firmware is TPl and it’s from Country/ Carrrier Poland (T-Mobile). The PDA Version of this Firmware is I9506XXUDRB1 and CSC is I9506TPLDRB1. The Android Version is 5.0.1 Lollipop. The changelist for this firmware is 13075798, build date is 15.02.2018 and the Security patch level date is 01.08.2017.

WARNING: This Stock Firmware Update released only for Samsung Galaxy S4 LTE-A (S800) GT-I9506, so do NOT try it in another Model number even if it has the same Device's name. Flashing wrong Firmware will brick you Android Phone, so you are the only one who responsible for that (We are NOT).

Model Name SAMSUNG Galaxy S4 LTE-A (S800)
Model Number GT-I9506
Country/ Carrier Poland (T-Mobile)
Region Code TPl
Android Version Android 5.0.1 Lollipop
PDA I9506XXUDRB1
CSC I9506TPLDRB1
Changelist 13075798
Build Date 15.02.2018
Security Patch Level

01.08.2017


Samsung Galaxy S4 LTE-A (S800) GT-I9506 Stock Firmware Download

Download Page1 Download Page2

More Stock Firmware Updates for GT-I9506


Samsung Galaxy S4 LTE-A (S800) Review Video

Feel Free to Share this Firmware Update with your Friends.

How to Flash the Firmware Update With Odin Flashing Tool?

Brief instructions about Firmware Flashing

– Extract (unzip) the firmware file that you have downloaded.
– Download Odin Flashing Tool.
– Extract Odin ZIP file.
– Open Odin Flashing Tool.
– Reboot your Phone in Download Mode (press and hold Home + Power + Volume Down buttons).
– Connect your phone to the PC and wait until you get a blue sign in Odin.
– Add the firmware file to AP / PDA.
– Make sure re-partition option is not ticked.
– Click the start button, and wait few minutes.

Follow this tutorial for detailed and Step-by-step instructions.

Samsung August 2017 Security Patch Update Details (SMR-AUG-2017)

<span style=”font-size: medium;”>Along with Google patches, Samsung Mobile provides 16 Samsung Vulnerabilities and Exposures (SVE) items described below, in order to improve our customer’s confidence on security of Samsung Mobile devices. Some of the SVE items may not be included in this package, in case these items were already included in a previous maintenance release.

<strong><span style=”font-size: large;”>SVE-2017-8889, SVE-2017-8891, and SVE-2017-8892: Stack overflow in trustlet</span></strong>

Severity: Low
Affected versions: M(6.0), N(7.x)
Reported on: April 11, 2017
Disclosure status: Privately disclosed.
Lack of boundary checking of a buffer in trustlet can lead to memory corruption.
The applied patch adds boundary checking.

<strong><span style=”font-size: large;”>SVE-2017-8890: Over-read in trustlet</span></strong>

Severity: Low
Affected versions: M(6.0), N(7.x)
Reported on: April 11, 2017
Disclosure status: Privately disclosed.
Lack of boundary checking of a buffer in trustlet can lead to unauthorized access to data outside of boundary.
The applied patch adds boundary checking.

<strong><span style=”font-size: large;”>SVE-2017-8893: Arbitrary write in trustlet</span></strong>

Severity: Low
Affected versions: M(6.0), N(7.x)
Reported on: April 11, 2017
Disclosure status: Privately disclosed.
Assuming privilege escalation is achieved, lack of boundary checking in a trustlet can lead to arbitrary write.
The applied patch adds boundary checking.

<strong><span style=”font-size: large;”>SVE-2017-9008 and SVE-2017-9009: Integer overflow in trustlet</span></strong>

Severity: Low
Affected versions: N(7.x)
Reported on: April 24, 2017
Disclosure status: Privately disclosed.
Lack of boundary checking of a buffer in trustlet can lead to memory corruption.
The patch removed the part of code related to Integer overflow.

<strong><span style=”font-size: large;”>SVE-2017-9383: Abnormal screen touch via malformed input with multiwindow_facade API</span></strong>

Severity: Low
Affected versions: M(6.0)
Reported on: May 31, 2017
Disclosure status: Privately disclosed.
Lack of appropriate validation check for display ID can halt system due to NullPointException problem caused by mismatch to a non-existing display.
The supplied patch prevents unexpected exception by confirming the validation of display ID.

<em>Some SVE items included in the Samsung Android Security Update cannot be disclosed at this time.</em> </span>

&nbsp;

See Full details about August 2017 Security Patch Update <a title=”February 2018 Security Patch Details (SMR-FEB-2018) | Samsung Security” href=”https://security.samsungmobile.com/securityUpdate.smsb” target=”_blank” rel=”noopener”>here</a>.

Leave a reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Categories