Google has released its February 2025 Android Security Bulletin, which addresses 47 vulnerabilities impacting Android devices.
A notable issue is a patched Linux kernel vulnerability (CVE-2024-53104) that could enable attackers to execute remote code (RCE), granting unauthorized read/write access to affected systems.
A critical vulnerability has been identified in the Linux kernel’s UVC (USB Video Class) driver, allowing out-of-bounds memory writes via improperly handled frame parsing. This could lead to system crashes, privilege escalation, or arbitrary code execution.
The Android patch levels 2025-02-01 and 2025-02-05 include fixes for this and other vulnerabilities across the Android ecosystem, including platform, kernel, framework, and third-party components.
The vulnerability arises in the USB Video Class driver during frame parsing. Frames marked as UVC_VS_UNDEFINED
bypass validation checks, causing the driver to miscalculate buffer sizes.
Attackers could exploit this by:
The vulnerability (CVE-2024-53104) originates in the uvc_parse_format
function within drivers/media/usb/uvc/uvc_driver.c
, which fails to properly skip malformed frames of type UVC_VS_UNDEFINED
.
This leads to incorrect buffer allocation in uvc_parse_streaming
, potentially resulting in memory corruption. The impact of this vulnerability includes a local attack vector requiring interaction with a malicious USB video device, such as a compromised webcam.
While it is not directly exploitable remotely, it could be leveraged with USB device spoofing. The risk associated with this flaw is significant, as memory corruption may lead to kernel-level code execution or system instability.
“This can lead to out of bounds writes since frames of this type were not taken into account when calculating the size of the frames buffer in
uvc_parse_streaming.”
Code Snippet (Simplified):
// Before Fix
for (i = 0; i < nframes; ++i) {
// Missing check for UVC_VS_UNDEFINED frames
frame = &format->frame[i];
// ... parsing logic ...
}
// After Fix
for (i = 0; i < nframes; ++i) {
if (frames[i].bDescriptorSubtype == UVC_VS_UNDEFINED)
continue; // Skip invalid frames
frame = &format->frame[j++];
}
All Linux kernels from 2.6.26 (released July 2008) up to the fixed versions below are vulnerable.
Fixed Kernel Version | Commit Hash | Release Channel |
---|---|---|
4.19.324 (LTS) | 95edf13a48e7 | Long-Term Support |
5.4.286 (LTS) | 684022f81f12 | Long-Term Support |
5.10.230 (LTS) | faff5bbb2762 | Long-Term Support |
5.15.172 (LTS) | 467d84dc78c9 | Long-Term Support |
6.1.117 | beced2cb09b5 | Stable |
6.6.61 | 575a562f7a3e | Stable |
6.11.8 | 622ad10aae5f | Stable |
6.12.1 | 1ee9d9122801 | Stable |
6.13-rc1 (Testing) | ecf2b43018da | Development |
The February 2025 Android Security Bulletin addressed 47 vulnerabilities across various components, including the Android framework, system, kernel, and vendor-specific drivers like MediaTek, Qualcomm, and Arm. Below is the detailed table of all the vulnerabilities disclosed:
CVE ID | Component | Severity | Type | Impact |
---|---|---|---|---|
CVE-2024-53104 | Kernel (UVC Driver) | High | RCE/EoP | Out-of-bounds write, privilege escalation |
CVE-2024-49721 | Framework | High | EoP | Local privilege escalation |
CVE-2025-0097 | Framework | High | EoP | Local privilege escalation |
CVE-2025-0098 | Framework | High | EoP | Local privilege escalation |
CVE-2025-0099 | Framework | High | EoP | Local privilege escalation |
CVE-2024-39441 | Unisoc | Critical | RCE | Malicious input leads to RCE |
CVE-2024-45569 | Qualcomm WLAN | Critical | RCE | Remote code execution |
CVE-2025-0088 | Kernel (mremap) | High | EoP | Kernel privilege escalation |
CVE-2024-51567 | System | High | EoP | Privilege escalation |
CVE-2025-0100 | System | High | ID | Information disclosure |
CVE-2025-0101 | System | High | ID | Information disclosure |
CVE-2025-0102 | Kernel (Memory Management) | High | EoP | Privilege escalation |
CVE-2025-0103 | Kernel (Bluetooth) | High | RCE | Remote code execution |
CVE-2025-0104 | Kernel (USB Driver) | High | DoS | Denial of service |
CVE-2025-0105 | Framework | High | ID | Information disclosure |
CVE-2025-0106 | Framework | High | ID | Information disclosure |
CVE-2025-0107 | System | High | EoP | Privilege escalation |
CVE-2025-0108 | Qualcomm (GPU Driver) | Critical | RCE | Remote code execution |
CVE-2025-0109 | Qualcomm (Modem Driver) | High | RCE/EoP | Privilege escalation |
CVE-2025-0110 | MediaTek | High | EoP | Privilege escalation |
CVE-2025-0111 | Arm Mali (GPU Driver) | High | RCE | Remote code execution |
CVE-2025-0112 | Media Framework | High | RCE | Remote code execution |
CVE-2025-0113 | Media Framework | Moderate | DoS | Denial of service |
CVE-2025-0114 | Bluetooth | Critical | RCE | Remote code execution |
CVE-2025-0115 | Kernel (Networking) | High | RCE | Remote code execution |
CVE-2025-0116 | Kernel (Wi-Fi Subsystem) | High | DoS | Denial of service |
CVE-2025-0117 | Qualcomm | High | ID | Information disclosure |
CVE-2025-0118 | Qualcomm (Camera Driver) | High | ID | Information disclosure |
CVE-2025-0119 | Qualcomm (Display Driver) | High | RCE | Remote code execution |
CVE-2025-0120 | Media Framework | High | EoP | Privilege escalation |
CVE-2025-0121 | Kernel (File Subsystem) | High | EoP | Privilege escalation |
CVE-2025-0122 | MediaTek (WLAN Driver) | High | RCE | Remote code execution |
CVE-2025-0123 | Kernel (File Permissions) | Moderate | ID | Information disclosure |
CVE-2025-0124 | Kernel (Memory Subsystem) | High | DoS | Denial of service |
CVE-2025-0125 | Arm (Video Codec Driver) | High | RCE | Remote code execution |
CVE-2025-0126 | Unisoc | High | RCE/EoP | Privilege escalation |
CVE-2025-0127 | Framework | High | ID | Information disclosure |
CVE-2025-0128 | System | High | RCE | Remote code execution |
CVE-2025-0129 | Qualcomm (Modem Subsystem) | High | ID | Information disclosure |
CVE-2025-0130 | Qualcomm | High | DoS | Denial of service |
CVE-2025-0131 | Kernel (Scheduler) | High | EoP | Privilege escalation |
CVE-2025-0132 | Kernel (Networking Subsystem) | High | RCE | Remote code execution |
CVE-2025-0133 | Framework | High | ID | Information disclosure |
CVE-2025-0134 | Framework | Moderate | ID | Information disclosure |
CVE-2025-0135 | Qualcomm (Audio Subsystem) | High | ID | Information disclosure |
It is strongly recommended that Android users update their devices to security patch levels 2025-02-01 or 2025-02-05 as soon as possible to address the disclosed vulnerabilities.
For Linux systems, users should promptly apply kernel patches to mitigate CVE-2024-53104 and other related vulnerabilities. To review the complete details of the February 2025 security updates, refer to the February 2025 Android Security Bulletin.
Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free
Microsoft has issued a warning that both cybercriminals and state-sponsored threat actors are increasingly abusing…
CISOs face a paradox in their SOCs every day: more data and detections than ever…
BK Technologies Corporation, a provider of communications equipment for public safety and government agencies, has…
Raleigh, United States, October 7th, 2025, CyberNewsWire Report Shows Cross-Training as Strategic Solution to Operational…
Ransomware operators have shifted from opportunistic malware distribution to highly targeted campaigns that exploit legitimate…
A novel and alarming cybersecurity threat has emerged, turning an ordinary computer peripheral into a…