Google Patches Linux Kernel RCE Vulnerability in Android, Allowing Unauthorized Read/Write Access

Google has disclosed and patched a critical Remote Code Execution (RCE) vulnerability (CVE-2024-53104) affecting the Linux Kernel component of Android devices.

This issue, categorized as “High” severity, could allow unauthorized attackers to gain read and write access to device memory, potentially leading to system compromise.

Vulnerability Details

The patched vulnerability, identified as part of the upstream Linux Kernel’s USB Video Class (UVC) component, allowed attackers to exploit unprotected code paths, bypassing security restrictions.

While exploitation required physical access to the device, the bug’s impact necessitated immediate rectification.

Google noted that mitigation measures, including platform enhancements and Google Play Protect, have minimized the potential for exploitation, but recommended that all users update their devices to the latest security patch.

The CVE reference and associated technical details are summarized below:

CVE IDComponentTypeSeverity
CVE-2024-53104UVCRCEHigh

The vulnerability has been addressed in the security patch level 2025-02-05, and users are encouraged to ensure their devices are updated to this or later versions.

The February Android Security Bulletin also addressed additional vulnerabilities, covering areas such as the Android Framework, System, and Hardware components. Among these, notable fixes include:

  • Escalation of Privilege (EoP) vulnerabilities in MediaTek and Qualcomm components.
  • Denial-of-Service (DoS) issues affecting Android System stability.

Google emphasized that partners were notified of these vulnerabilities at least a month prior to the bulletin’s release, and patches were made available in the Android Open Source Project (AOSP) repository.

Security Patch Availability

Devices running Android 10 and later are eligible for the update. Google confirmed that security patch levels of 2025-02-01 and 2025-02-05 address these vulnerabilities.

Manufacturers are required to implement the latest fixes to declare compliance.

For users concerned about device security, Google offers guidance on verifying patch levels.

Updated devices should display one of the following security patch strings:

  • [ro.build.version.security_patch]:[2025-02-01]
  • [ro.build.version.security_patch]:[2025-02-05]

Google advises users to:

  • Update their Android devices to the latest software version.
  • Enable Google Play Protect, which provides real-time protection against potentially harmful applications (PHAs).
  • Exercise caution while installing apps from untrusted sources.

The Android security team reaffirmed its commitment to improving platform resilience, highlighting ongoing efforts to track exploit attempts and notify users of risks promptly.

This patch serves as a reminder of the importance of keeping devices updated and underscores Google’s proactive approach to addressing critical vulnerabilities in the Android ecosystem.

Also Read:

Recent Articles

Related Stories

LEAVE A REPLY

Please enter your comment!
Please enter your name here