The affected, generally, had their phone updated to security patch from February 1, 2019. And with this error it allowed the hacker remotely control the device affected.
The way to act was simple, if the PNG document was available from within an application (that is, it is not in our gallery), it could be infected with the malware (malicious software) for remote access to the device.
Many of the problems were due to some defects in the remote code of bluetooth transmissions, the Linux kernel, NVIDIA components and the most affected, Qualcomm drivers.
The folks at Google have not wasted a second trying to fix this problem, and after releasing the security patch on February 1, 2019 and the vulnerability was detected. In just four days they have released a new patch, the security patch of February 5, 2019.
This patch, which has quickly reached the devices with Android One and Google Pixel, fix the problems mentioned above.
The problem comes from phones that do not have Android One, which are from manufacturers such as Samsung or Huawei, which do not update immediately. Yes it is true that it is possible that many manufacturers, due to the slow updates, have not yet updated to the security patch of February 1, 2019, so we assume that when they receive the February patch, they will already receive the 5 February.
If you are wondering what version of the security patch you have and you want to look at it, you have to go to the settings of your system, to the section of phone information, Now it depends on the manufacturer, but it will be or in some section with names like state or directly in the Android version. It is looking for where you are with your manufacturer.
But it has affected few users, if you do not have the security patch of February 1 or you have a version lower than Android 7.0 Nougat, you should not have any problem with this security flaw, now already solved (or almost).