Google Patched Linux Kernel Vulnerability In Android Allows Attackers Gain Write Access


Google has released its February 2025 Android Security Bulletin, which addresses 47 vulnerabilities impacting Android devices.

A notable issue is a patched Linux kernel vulnerability (CVE-2024-53104) that could enable attackers to execute remote code (RCE), granting unauthorized read/write access to affected systems.

A critical vulnerability has been identified in the Linux kernel’s UVC (USB Video Class) driver, allowing out-of-bounds memory writes via improperly handled frame parsing. This could lead to system crashes, privilege escalation, or arbitrary code execution.

SIEM as a Service

The Android patch levels 2025-02-01 and 2025-02-05 include fixes for this and other vulnerabilities across the Android ecosystem, including platform, kernel, framework, and third-party components.

Technical Analysis

The vulnerability arises in the USB Video Class driver during frame parsing. Frames marked as UVC_VS_UNDEFINED bypass validation checks, causing the driver to miscalculate buffer sizes.

Attackers could exploit this by:

  1. Inserting a malicious USB device or tampering with video streams.
  2. Triggering buffer overflow via malformed frames, overwriting adjacent memory regions.

The vulnerability (CVE-2024-53104) originates in the uvc_parse_format function within drivers/media/usb/uvc/uvc_driver.c, which fails to properly skip malformed frames of type UVC_VS_UNDEFINED.

This leads to incorrect buffer allocation in uvc_parse_streaming, potentially resulting in memory corruption. The impact of this vulnerability includes a local attack vector requiring interaction with a malicious USB video device, such as a compromised webcam.

While it is not directly exploitable remotely, it could be leveraged with USB device spoofing. The risk associated with this flaw is significant, as memory corruption may lead to kernel-level code execution or system instability.

“This can lead to out of bounds writes since frames of this type were not taken into account when calculating the size of the frames buffer in
uvc_parse_streaming.”

Code Snippet (Simplified):

// Before Fix
for (i = 0; i < nframes; ++i) {
    // Missing check for UVC_VS_UNDEFINED frames  
    frame = &format->frame[i];
    // ... parsing logic ...
}

// After Fix  
for (i = 0; i < nframes; ++i) {
    if (frames[i].bDescriptorSubtype == UVC_VS_UNDEFINED)
        continue;  // Skip invalid frames  
    frame = &format->frame[j++];
}

Affected Kernel Versions

All Linux kernels from 2.6.26 (released July 2008) up to the fixed versions below are vulnerable.

Fixed Kernel Version Commit Hash Release Channel
4.19.324 (LTS) 95edf13a48e7 Long-Term Support
5.4.286 (LTS) 684022f81f12 Long-Term Support
5.10.230 (LTS) faff5bbb2762 Long-Term Support
5.15.172 (LTS) 467d84dc78c9 Long-Term Support
6.1.117 beced2cb09b5 Stable
6.6.61 575a562f7a3e Stable
6.11.8 622ad10aae5f Stable
6.12.1 1ee9d9122801 Stable
6.13-rc1 (Testing) ecf2b43018da Development

February 2025 Android Security Bulletin:

The February 2025 Android Security Bulletin addressed 47 vulnerabilities across various components, including the Android framework, system, kernel, and vendor-specific drivers like MediaTek, Qualcomm, and Arm. Below is the detailed table of all the vulnerabilities disclosed:

CVE ID Component Severity Type Impact
CVE-2024-53104 Kernel (UVC Driver) High RCE/EoP Out-of-bounds write, privilege escalation
CVE-2024-49721 Framework High EoP Local privilege escalation
CVE-2025-0097 Framework High EoP Local privilege escalation
CVE-2025-0098 Framework High EoP Local privilege escalation
CVE-2025-0099 Framework High EoP Local privilege escalation
CVE-2024-39441 Unisoc Critical RCE Malicious input leads to RCE
CVE-2024-45569 Qualcomm WLAN Critical RCE Remote code execution
CVE-2025-0088 Kernel (mremap) High EoP Kernel privilege escalation
CVE-2024-51567 System High EoP Privilege escalation
CVE-2025-0100 System High ID Information disclosure
CVE-2025-0101 System High ID Information disclosure
CVE-2025-0102 Kernel (Memory Management) High EoP Privilege escalation
CVE-2025-0103 Kernel (Bluetooth) High RCE Remote code execution
CVE-2025-0104 Kernel (USB Driver) High DoS Denial of service
CVE-2025-0105 Framework High ID Information disclosure
CVE-2025-0106 Framework High ID Information disclosure
CVE-2025-0107 System High EoP Privilege escalation
CVE-2025-0108 Qualcomm (GPU Driver) Critical RCE Remote code execution
CVE-2025-0109 Qualcomm (Modem Driver) High RCE/EoP Privilege escalation
CVE-2025-0110 MediaTek High EoP Privilege escalation
CVE-2025-0111 Arm Mali (GPU Driver) High RCE Remote code execution
CVE-2025-0112 Media Framework High RCE Remote code execution
CVE-2025-0113 Media Framework Moderate DoS Denial of service
CVE-2025-0114 Bluetooth Critical RCE Remote code execution
CVE-2025-0115 Kernel (Networking) High RCE Remote code execution
CVE-2025-0116 Kernel (Wi-Fi Subsystem) High DoS Denial of service
CVE-2025-0117 Qualcomm High ID Information disclosure
CVE-2025-0118 Qualcomm (Camera Driver) High ID Information disclosure
CVE-2025-0119 Qualcomm (Display Driver) High RCE Remote code execution
CVE-2025-0120 Media Framework High EoP Privilege escalation
CVE-2025-0121 Kernel (File Subsystem) High EoP Privilege escalation
CVE-2025-0122 MediaTek (WLAN Driver) High RCE Remote code execution
CVE-2025-0123 Kernel (File Permissions) Moderate ID Information disclosure
CVE-2025-0124 Kernel (Memory Subsystem) High DoS Denial of service
CVE-2025-0125 Arm (Video Codec Driver) High RCE Remote code execution
CVE-2025-0126 Unisoc High RCE/EoP Privilege escalation
CVE-2025-0127 Framework High ID Information disclosure
CVE-2025-0128 System High RCE Remote code execution
CVE-2025-0129 Qualcomm (Modem Subsystem) High ID Information disclosure
CVE-2025-0130 Qualcomm High DoS Denial of service
CVE-2025-0131 Kernel (Scheduler) High EoP Privilege escalation
CVE-2025-0132 Kernel (Networking Subsystem) High RCE Remote code execution
CVE-2025-0133 Framework High ID Information disclosure
CVE-2025-0134 Framework Moderate ID Information disclosure
CVE-2025-0135 Qualcomm (Audio Subsystem) High ID Information disclosure

It is strongly recommended that Android users update their devices to security patch levels 2025-02-01 or 2025-02-05 as soon as possible to address the disclosed vulnerabilities.

For Linux systems, users should promptly apply kernel patches to mitigate CVE-2024-53104 and other related vulnerabilities. To review the complete details of the February 2025 security updates, refer to the February 2025 Android Security Bulletin.

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free



Source link