Google patches odd Android kernel security bug amid signs of targeted exploitation

Google has released its February Android security updates, including a fix for a high-severity kernel-level vulnerability, which is suspected to be in use by targeted exploits.

The flaw, CVE-2024-53104, is an intriguing Linux kernel flaw in its USB video-class driver code. There's not a lot of detail about the bug, other than the fix is to skip the parsing of undefined video frames that would otherwise cause the kernel to write to memory it's not supposed to, which could be used to crash or fully hijack a device.

What's interesting is that this driver code is supposed to mainly handle USB cameras and similar video sources. Thus, exploitation potentially involves connecting some malicious hardware that feeds bad data into the system. Google indicated the flaw can be used to achieve "physical escalation of privilege with no additional execution privileges needed," which to us sounds like someone being able to plug a malicious gadget - perhaps something law enforcement might use - into a vulnerable Android device and taking it over. Very curious.

"There are indications that CVE-2024-53104 may be under limited, targeted exploitation," Google said in its advisory. We note that a patch to address the hole in the open source kernel was accepted at the end of last year.

Of the 46 patches pushed out by Google this month, only one is rated as "critical" by the ad slinger: CVE-2024-45569, with a CVSS rating of 9.8 out of 10. The flaw is a classic failure to check the length of an array in Qualcomm's wireless LAN stack, triggered by the processing of network management frames over the air, allowing privileged remote code execution to be achieved, or crashing the device. Ouch.

Google notes the severity of all other flaws in the advisory is "high." The only other kernel issue - CVE-2025-0088 - addresses a race condition in which the system page tables can be changed; that could be exploited by a rogue app to gain control of the device.

In all, Qualcomm kit got 10 patches, four of which were related to problems with its camera drivers. MediaTek devices received five patches and Imagination Technologies had four, in the latter case all for its PowerVR-GPU engine.

As ever with Android patches, it's the users of Google's Pixel mobile platform who will get the first chance to download the update, with other manufacturers following behind. Samsung has just put out its January patches and some manufacturers are even more tardy. ®

Search
About Us
Website HardCracked provides softwares, patches, cracks and keygens. If you have software or keygens to share, feel free to submit it to us here. Also you may contact us if you have software that needs to be removed from our website. Thanks for use our service!
IT News
Feb 11
Intel loses another exec as datacenter, AI chief named Nokia CEO

Justin Hotard tapped to replace Pekka Lundmark at the Finnish telco

Feb 10
Meta's plan to erase 5% of workforce starts today

'Intense year' ahead, warned Zuck. Got to spend billions on AI and work to stay out of Trump's bad books

Feb 10
The biggest microcode attack in our history is underway

Opinion When your state machines are vulnerable, all bets are off

Feb 10
CentOS Connect conference announces return of Firefox

FOSDEM 2025 OKD project also has its own immutable CentOS image, which could be fun

Feb 10
Legacy systems running UK's collector are taxing - in more ways than one

Costs for fixing them and keeping them working up by 390%, NAO report reveals

Feb 10
Cloudflare hopes to rebuild the Web for the AI age - with itself in the middle

Also claims it's found DeepSeek-eque optimizations that reduce AI infrastructure requirements

Feb 8
'Maybe the problem is you' ... Linus Torvalds wades into Linux kernel Rust driver drama

Open source project chief hits out at 'social media brigading'