{"id":9304,"date":"2025-02-04T01:51:00","date_gmt":"2025-02-04T04:51:00","guid":{"rendered":"https:\/\/www.blog.lineasdns.com\/google-patches-47-android-security-flaws-including-actively-exploited-cve-2024-53104\/"},"modified":"2025-02-04T01:51:00","modified_gmt":"2025-02-04T04:51:00","slug":"google-patches-47-android-security-flaws-including-actively-exploited-cve-2024-53104","status":"publish","type":"post","link":"https:\/\/www.blog.lineasdns.com\/en\/google-patches-47-android-security-flaws-including-actively-exploited-cve-2024-53104\/","title":{"rendered":"Google Patches 47 Android Security Flaws, Including Actively Exploited CVE-2024-53104"},"content":{"rendered":"<p> <br \/>\n<\/p>\n<div id=\"articlebody\">\n<div class=\"separator\" style=\"clear: both;\"><a target=\"_blank\" href=\"https:\/\/www.blog.lineasdns.com\/wp-content\/uploads\/2025\/03\/1741933743_277_android.png\" style=\"clear: left; display: block; float: left;  text-align: center;\"><\/a><\/div>\n<p>Google has <a target=\"_blank\" href=\"https:\/\/source.android.com\/docs\/security\/bulletin\/2025-02-01\" rel=\"noopener\" target=\"_blank\">shipped patches<\/a> to address 47 security flaws in its Android operating system, including one it said has come under active exploitation in the wild.<\/p>\n<p>The vulnerability in question is <a target=\"_blank\" href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-53104\" rel=\"noopener\" target=\"_blank\">CVE-2024-53104<\/a> (CVSS score: 7.8), which has been described as a case of privilege escalation in a kernel component known as the USB Video Class (<a target=\"_blank\" href=\"https:\/\/source.android.com\/docs\/core\/camera\/external-usb-cameras\" rel=\"noopener\" target=\"_blank\">UVC<\/a>) driver.<\/p>\n<p>Successful exploitation of the flaw could lead to physical escalation of privilege, Google said, noting that it&#8217;s aware that it may be under &#8220;limited, targeted exploitation.&#8221;<\/p>\n<p>While no other technical details have been offered, Linux kernel developer Greg Kroah-Hartman <a target=\"_blank\" href=\"https:\/\/lore.kernel.org\/linux-cve-announce\/2024120232-CVE-2024-53104-d781@gregkh\/\" target=\"_blank\">revealed<\/a> in early December 2024 that the vulnerability is rooted in the Linux kernel and that it was introduced in <a target=\"_blank\" href=\"https:\/\/en.wikipedia.org\/wiki\/Linux_kernel_version_history#Releases_2.6.x.y\" rel=\"noopener\" target=\"_blank\">version 2.6.26<\/a>, which was <a target=\"_blank\" href=\"https:\/\/github.com\/torvalds\/linux\/commit\/c0efd232929c2cd87238de2cccdaf4e845be5b0c\" rel=\"noopener\" target=\"_blank\">released<\/a> in mid-2008.<\/p>\n<div class=\"dog_two clear\"><center class=\"cf\"><a target=\"_blank\" href=\"https:\/\/thehackernews.uk\/cloud-secure-d\" rel=\"nofollow noopener sponsored\" target=\"_blank\" title=\"Cybersecurity\"><img loading=\"lazy\" decoding=\"async\" class=\"lazyload\" alt=\"Cybersecurity\" src=\"https:\/\/www.blog.lineasdns.com\/wp-content\/uploads\/2025\/03\/cloud-secure-d.jpg\" width=\"727\" height=\"90\"\/><\/a><\/center><\/div>\n<p>Specifically, it has to do with an <a target=\"_blank\" href=\"https:\/\/github.com\/torvalds\/linux\/commit\/ecf2b43018da9579842c774b7f35dbe11b5c38dd\" rel=\"noopener\" target=\"_blank\">out-of-bounds write condition<\/a> that could arise as a result of parsing frames of type UVC_VS_UNDEFINED in a function named &#8220;uvc_parse_format()&#8221; in the &#8220;<a target=\"_blank\" href=\"https:\/\/github.com\/torvalds\/linux\/blob\/master\/drivers\/media\/usb\/uvc\/uvc_driver.c\" rel=\"noopener\" target=\"_blank\">uvc_driver.c<\/a>&#8221; program.<\/p>\n<p>This also means that the flaw could be <a target=\"_blank\" href=\"https:\/\/cwe.mitre.org\/data\/definitions\/787.html\" rel=\"noopener\" target=\"_blank\">weaponized<\/a> to result in memory corruption, program crash, or arbitrary code execution.<\/p>\n<p>It&#8217;s not currently not clear who is behind the exploitation of the vulnerability, although the fact that it could facilitate &#8220;physical&#8221; privilege escalation suggests possible misuse by forensic data extraction tools, per <a target=\"_blank\" href=\"https:\/\/x.com\/GrapheneOS\/status\/1886639593430376958\">GrapheneOS<\/a>.<\/p>\n<p>Also patched as part of Google&#8217;s monthly security updates is a critical flaw in Qualcomm&#8217;s WLAN component (<a target=\"_blank\" href=\"https:\/\/docs.qualcomm.com\/product\/publicresources\/securitybulletin\/february-2025-bulletin.html\" rel=\"noopener\" target=\"_blank\">CVE-2024-45569<\/a>, CVSS score: 9.8) that could also lead to memory corruption.<\/p>\n<p>It&#8217;s worth noting that Google has released two security patch levels, 2025-02-01 and 2025-02-05, so as to give flexibility to Android partners to address a portion of vulnerabilities that are similar across all Android devices more quickly.<\/p>\n<p>&#8220;Android partners are encouraged to fix all issues in this bulletin and use the latest security patch level,&#8221; Google said.<\/p>\n<h3>Update<\/h3>\n<p>The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has <a target=\"_blank\" href=\"https:\/\/www.cisa.gov\/news-events\/alerts\/2025\/02\/05\/cisa-adds-one-known-exploited-vulnerability-catalog\">added<\/a> CVE-2024-53104 to its Known Exploited Vulnerabilities (<a target=\"_blank\" href=\"https:\/\/www.cisa.gov\/known-exploited-vulnerabilities-catalog\">KEV<\/a>) catalog, requiring federal agencies to patch the Linux kernel bug by February 26, 2025.<\/p>\n<p><\/p>\n<div class=\"cf note-b\">Found this article interesting?  Follow us on <a target=\"_blank\" href=\"https:\/\/twitter.com\/thehackersnews\" rel=\"noopener\" target=\"_blank\">Twitter <i class=\"icon-font icon-twitter\">\uf099<\/i><\/a> and <a target=\"_blank\" href=\"https:\/\/www.linkedin.com\/company\/thehackernews\/\" rel=\"noopener\" target=\"_blank\">LinkedIn<\/a> to read more exclusive content we post.<\/div>\n<\/div>\n<p><script async src=\"\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><br \/>\n<br \/><br \/>\n<br \/>\n<center><\/p>\n<p>________________________________________________<\/p>\n<p><\/center><\/p>\n<p><center><\/p>\n<h2>\ud83d\ude80 Dominate the Digital World with the Best Hosting in Argentina! \ud83d\ude80<\/h2>\n<p><\/center> <\/p>\n<p>At <a href=\"https:\/\/www.fulltech.com.ar\" target=\"_blank\" rel=\"noopener\"><strong>Full Tech Solutions<\/strong><\/a>, we provide high-performance <strong>Cloud Hosting<\/strong>, perfect for entrepreneurs, businesses, and developers who need speed, security, and expert support.<\/p>\n<p>\u2728 <strong>Lightning-Fast Speed:<\/strong> Your website will load in the blink of an eye.<br \/>\n\ud83d\udd12 <strong>Top-Notch Security:<\/strong> Advanced protection for your data and peace of mind for your business.<br \/>\n\ud83d\udcde <strong>24\/7 Support:<\/strong> Our team of experts is always ready to help you.<\/p>\n<p>Don&#8217;t just choose any hosting. <strong><a href=\"https:\/\/www.fulltech.com.ar\" target=\"_blank\" rel=\"noopener\">Choose the best with Full Tech Solutions<\/a><\/strong> and stand out from the crowd.<\/p>\n<p>\ud83c\udf10 Boost your online presence with Argentina&#8217;s most reliable hosting!<\/p>\n<p>\n<a href=\"https:\/\/thehackernews.com\/2025\/02\/google-patches-47-android-security.html?rand=1734\">Source Link<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"Google has shipped patches to address 47 security flaws in its Android operating system, including one it said&hellip;","protected":false},"author":1,"featured_media":9305,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_seopress_robots_primary_cat":"","_seopress_titles_title":"","_seopress_titles_desc":"","_seopress_robots_index":"","csco_singular_sidebar":"","csco_page_header_type":"","csco_page_load_nextpost":"","footnotes":""},"categories":[68],"tags":[84,77,70,69,71,72,73,78,74,75,80,82,81,79,76,83],"class_list":{"0":"post-9304","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-hacker-news","8":"tag-computer-security","9":"tag-cyber-attacks","10":"tag-cyber-news","11":"tag-cyber-security-news","12":"tag-cyber-security-news-today","13":"tag-cyber-security-updates","14":"tag-cyber-updates","15":"tag-data-breach","16":"tag-hacker-news","17":"tag-hacking-news","18":"tag-how-to-hack","19":"tag-information-security","20":"tag-network-security","21":"tag-ransomware-malware","22":"tag-software-vulnerability","23":"tag-the-hacker-news","24":"cs-entry"},"_links":{"self":[{"href":"https:\/\/www.blog.lineasdns.com\/en\/wp-json\/wp\/v2\/posts\/9304","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.blog.lineasdns.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.blog.lineasdns.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.blog.lineasdns.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.blog.lineasdns.com\/en\/wp-json\/wp\/v2\/comments?post=9304"}],"version-history":[{"count":0,"href":"https:\/\/www.blog.lineasdns.com\/en\/wp-json\/wp\/v2\/posts\/9304\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.blog.lineasdns.com\/en\/wp-json\/wp\/v2\/media\/9305"}],"wp:attachment":[{"href":"https:\/\/www.blog.lineasdns.com\/en\/wp-json\/wp\/v2\/media?parent=9304"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.blog.lineasdns.com\/en\/wp-json\/wp\/v2\/categories?post=9304"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.blog.lineasdns.com\/en\/wp-json\/wp\/v2\/tags?post=9304"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}