Arthur T Knackerbracket has found the following story:
[Google] rolled out security patches for the Android mobile operating system but did not include the fix for at least one bug that enables increasing permissions to kernel level.
Security flaws that enable privilege escalation can be exploited from a position with limited access to one with elevated access to critical files on the system. In order to utilize this, an attacker should have already compromised the device but have their actions restricted by insufficient permissions.
The Android Security Bulletin for September includes fixes for a couple of critical vulnerabilities in the media framework and a load of high-severity bugs. But vulnerability reported today is not on the list.
The vulnerability exists in the driver for the Video For Linux 2 (V4L2) interface used for video recording. It is estimated as a high-severity zero-day so it does not have an identification number yet.
"The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this to escalate privileges in the context of the kernel."
The kernel is the part of the operating system with the highest privileges. This level of permissions can be used by a malicious application to run code that can lead to full system compromise.
Discovery of the vulnerability is credited to Lance Jiang and Moony Li of TrendMicro Research, who reported it through the Zero Day Initiative (ZDI) program. Google learned about it in March and acknowledged it. The company, though, said that a fix would become available but gave no date for delivering a patch.
Without an official solution for this security risk, mitigating it falls in the hands of the user. Brian Gorenc, director of Trend Micro’s ZDI program told BleepingComputer that users should be careful with the apps they install on their Android devices.
"They should only load known-good apps directly from the Google Play store and avoid side-loading apps from third parties."
(Score: 5, Informative) by canopic jug on Sunday September 08 2019, @04:05AM
It's not a zero day. Fix the title. Google was informed about the bug back in March making it not a 0-day but a 180+day.
Whatever. It did not catch them by surprise. They just have not deigned to patch it, spending their time on stupid stuff like more surveillance or migrating the world from HTTP on TCP to HTTP on UDP.
Money is not free speech. Elections should not be auctions.
(Score: 2) by jmichaelhudsondotnet on Sunday September 08 2019, @07:39AM (1 child)
What if I told you that google was the bug?
(I know same joke, but really, we need to imagine living without this shitnado of a company and stop treating it like some sort of greek god)
(Score: 0) by Anonymous Coward on Sunday September 08 2019, @02:10PM
I've tried googling things on bing, but it's not nearly as good.