frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Open in hackernews

Google Android Team Finds Critical Qualcomm GPU Flaws Affecting Millions

2•Great_Cat•6mo ago
Google’s Android Security team, notably the Threat Analysis Group (TAG), has recently disclosed multiple critical zero-day vulnerabilities affecting Qualcomm’s Adreno GPU drivers — components embedded in the graphics subsystem of billions of Android devices worldwide. These vulnerabilities have been actively exploited in the wild, representing a severe security risk to end users.

Technical Overview

The flaws, identified as CVE-2025-21479, CVE-2025-21480, and CVE-2025-27038, are primarily rooted in memory corruption issues and improper authorization checks within the GPU’s driver code. Due to the Adreno GPU’s privileged position in the Android kernel space, these bugs enable attackers to escalate privileges from user space to kernel space by crafting malicious GPU command streams or malformed graphics data. • CVE-2025-21479 & CVE-2025-21480: These vulnerabilities relate to incorrect authorization mechanisms in the command execution path of the Adreno GPU driver. An attacker controlling a malicious app or injected code can bypass standard access controls, leading to unauthorized command execution within the GPU microkernel, which can corrupt memory or trigger out-of-bounds writes. • CVE-2025-27038: This is a use-after-free vulnerability that occurs during the rendering pipeline. When exploited, it can cause arbitrary code execution by manipulating freed memory buffers, enabling attackers to run arbitrary code with kernel-level privileges.

Impact and Exploitation

The Qualcomm Adreno GPU driver is widely deployed across Snapdragon chipsets powering numerous flagship and mid-range devices from manufacturers such as Samsung, OnePlus, Xiaomi, and more. Because these GPUs interact closely with the Android kernel, exploitation of these vulnerabilities enables: • Remote Code Execution (RCE): Attackers can execute arbitrary code on the device remotely without requiring user interaction in some scenarios. • Privilege Escalation: Gaining kernel privileges, thereby bypassing Android’s security sandboxing and app permission models. • Persistent Malware Installation: Ability to install rootkits or persistent malware modules that survive device reboots. • Data Exfiltration and Surveillance: Unauthorized access to sensitive user data, including credentials, messages, and media files.

Google TAG’s reports confirmed active exploitation of these zero-day flaws, underlining the urgency for device manufacturers and users to apply patches.

Mitigation and Recommendations

Qualcomm promptly released patches addressing these vulnerabilities, which have been forwarded to OEMs for integration into Android firmware updates. Due to the fragmentation of the Android ecosystem, rollout times vary widely, leaving many devices exposed.

Security experts recommend: • Immediate Updates: Users should regularly check for and install firmware updates from their device manufacturers. • App Vetting: Avoid downloading apps outside trusted sources like Google Play to minimize risk exposure. • Behavioral Monitoring: Users and enterprises should monitor devices for abnormal CPU/GPU usage, crashes, or suspicious network activity. • Enterprise Controls: Organizations should enforce mobile device management (MDM) policies to ensure timely patch deployment.

Broader Context

These vulnerabilities highlight the challenges inherent in securing low-level hardware drivers like GPUs, which often operate with high privileges and complex codebases. They remain attractive targets for advanced threat actors due to the potential for complete system compromise.

The incident reinforces the critical need for collaboration between chipset vendors, OS developers, and manufacturers to ensure rapid vulnerability identification and patch deployment, safeguarding the vast Android user base.

Show HN: HypothesisHub – An open API where AI agents collaborate on medical res

https://medresearch-ai.org/hypotheses-hub/
1•panossk•51s ago•0 comments

Big Tech vs. OpenClaw

https://www.jakequist.com/thoughts/big-tech-vs-openclaw/
1•headalgorithm•3m ago•0 comments

Anofox Forecast

https://anofox.com/docs/forecast/
1•marklit•3m ago•0 comments

Ask HN: How do you figure out where data lives across 100 microservices?

1•doodledood•3m ago•0 comments

Motus: A Unified Latent Action World Model

https://arxiv.org/abs/2512.13030
1•mnming•3m ago•0 comments

Rotten Tomatoes Desperately Claims 'Impossible' Rating for 'Melania' Is Real

https://www.thedailybeast.com/obsessed/rotten-tomatoes-desperately-claims-impossible-rating-for-m...
1•juujian•5m ago•0 comments

The protein denitrosylase SCoR2 regulates lipogenesis and fat storage [pdf]

https://www.science.org/doi/10.1126/scisignal.adv0660
1•thunderbong•7m ago•0 comments

Los Alamos Primer

https://blog.szczepan.org/blog/los-alamos-primer/
1•alkyon•9m ago•0 comments

NewASM Virtual Machine

https://github.com/bracesoftware/newasm
1•DEntisT_•12m ago•0 comments

Terminal-Bench 2.0 Leaderboard

https://www.tbench.ai/leaderboard/terminal-bench/2.0
2•tosh•12m ago•0 comments

I vibe coded a BBS bank with a real working ledger

https://mini-ledger.exe.xyz/
1•simonvc•12m ago•1 comments

The Path to Mojo 1.0

https://www.modular.com/blog/the-path-to-mojo-1-0
1•tosh•15m ago•0 comments

Show HN: I'm 75, building an OSS Virtual Protest Protocol for digital activism

https://github.com/voice-of-japan/Virtual-Protest-Protocol/blob/main/README.md
4•sakanakana00•18m ago•0 comments

Show HN: I built Divvy to split restaurant bills from a photo

https://divvyai.app/
3•pieterdy•21m ago•0 comments

Hot Reloading in Rust? Subsecond and Dioxus to the Rescue

https://codethoughts.io/posts/2026-02-07-rust-hot-reloading/
3•Tehnix•21m ago•1 comments

Skim – vibe review your PRs

https://github.com/Haizzz/skim
2•haizzz•23m ago•1 comments

Show HN: Open-source AI assistant for interview reasoning

https://github.com/evinjohnn/natively-cluely-ai-assistant
4•Nive11•23m ago•6 comments

Tech Edge: A Living Playbook for America's Technology Long Game

https://csis-website-prod.s3.amazonaws.com/s3fs-public/2026-01/260120_EST_Tech_Edge_0.pdf?Version...
2•hunglee2•27m ago•0 comments

Golden Cross vs. Death Cross: Crypto Trading Guide

https://chartscout.io/golden-cross-vs-death-cross-crypto-trading-guide
2•chartscout•29m ago•0 comments

Hoot: Scheme on WebAssembly

https://www.spritely.institute/hoot/
3•AlexeyBrin•32m ago•0 comments

What the longevity experts don't tell you

https://machielreyneke.com/blog/longevity-lessons/
2•machielrey•33m ago•1 comments

Monzo wrongly denied refunds to fraud and scam victims

https://www.theguardian.com/money/2026/feb/07/monzo-natwest-hsbc-refunds-fraud-scam-fos-ombudsman
3•tablets•38m ago•1 comments

They were drawn to Korea with dreams of K-pop stardom – but then let down

https://www.bbc.com/news/articles/cvgnq9rwyqno
2•breve•40m ago•0 comments

Show HN: AI-Powered Merchant Intelligence

https://nodee.co
1•jjkirsch•43m ago•0 comments

Bash parallel tasks and error handling

https://github.com/themattrix/bash-concurrent
2•pastage•43m ago•0 comments

Let's compile Quake like it's 1997

https://fabiensanglard.net/compile_like_1997/index.html
2•billiob•44m ago•0 comments

Reverse Engineering Medium.com's Editor: How Copy, Paste, and Images Work

https://app.writtte.com/read/gP0H6W5
2•birdculture•49m ago•0 comments

Go 1.22, SQLite, and Next.js: The "Boring" Back End

https://mohammedeabdelaziz.github.io/articles/go-next-pt-2
1•mohammede•55m ago•0 comments

Laibach the Whistleblowers [video]

https://www.youtube.com/watch?v=c6Mx2mxpaCY
1•KnuthIsGod•56m ago•1 comments

Slop News - The Front Page right now but it's only Slop

https://slop-news.pages.dev/slop-news
1•keepamovin•1h ago•1 comments