SB2023040440 - Multiple vulnerabilities in Google Android
Published: April 4, 2023 Updated: January 15, 2024
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 62 secuirty vulnerabilities.
1) Buffer over-read (CVE-ID: CVE-2022-40503)
The vulnerability allows a remote attacker to read and manipulate data.
The vulnerability exists due to improper input validation in Bluetooth Host.. A remote attacker can read and manipulate data.
2) Double Free (CVE-ID: CVE-2022-33231)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation in Core. A local application can execute arbitrary code.
3) Buffer overflow (CVE-ID: CVE-2022-33288)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation in Core. A local application can execute arbitrary code.
4) Improper Validation of Array Index (CVE-ID: CVE-2022-33289)
The vulnerability allows a local attacker to execute arbitrary code.
The vulnerability exists due to improper input validation in Modem. A local attacker can execute arbitrary code.
5) Improper Validation of Array Index (CVE-ID: CVE-2022-33302)
The vulnerability allows a local attacker to execute arbitrary code.
The vulnerability exists due to improper input validation in User Identity Module. A local attacker can execute arbitrary code.
6) Integer overflow (CVE-ID: CVE-2022-33269)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation in Core. A local application can execute arbitrary code.
7) Time-of-check Time-of-use (TOCTOU) Race Condition (CVE-ID: CVE-2022-33270)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation in Modem. A remote attacker can perform a denial of service (DoS) attack.
8) Integer overflow (CVE-ID: CVE-2022-40532)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation in WLAN. A local application can execute arbitrary code.
9) Integer underflow (CVE-ID: CVE-2023-21630)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation in Multimedia Framework. A local application can execute arbitrary code.
10) Use-after-free (CVE-ID: CVE-2022-4696)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error in io_uring and the IORING_OP_SPLICE operation. A local user can trigger a use-after-free error and escalate privileges on the system.
11) Input validation error (CVE-ID: CVE-2021-0874)
The vulnerability allows a local application to escalate privileges on the system.
The vulnerability exists due to insufficient input validation within PowerVR-GPU. A local application can execute arbitrary code with elevated privileges.
12) Buffer overflow (CVE-ID: CVE-2023-20941)
The vulnerability allows a local application to execute arbitrary code with elevated privileges.
The vulnerability exists due to a boundary error in drivers/usb/gadget/function/f_accessory.c. A local application can trigger memory corruption and execute arbitrary code with elevated privileges.
13) Use-after-free (CVE-ID: CVE-2022-33917)
The vulnerability allows a local application to execute arbitrary code with escalated privileges.
The vulnerability exists due to a use-after-free error when processing GPU. A local application can execute arbitrary code with elevated privileges.
14) Use-after-free (CVE-ID: CVE-2022-36449)
The vulnerability allows a local application to escalate privileges on the system.
The vulnerability exists due to a use-after-free error. A local application can execute arbitrary code with elevated privileges.
15) Use-after-free (CVE-ID: CVE-2022-38181)
The vulnerability allows a local application to escalate privileges on the system.
The vulnerability exists due to a use-after-free error. A local application can trigger memory corruption and execute arbitrary code with elevated privileges.
Note, this vulnerability is known to be exploited in targeted attacks spotted in November 2022.
16) Use-after-free (CVE-ID: CVE-2022-41757)
The vulnerability allows a local application to escalate privileges on the system.
17) Use-after-free (CVE-ID: CVE-2022-42716)
The vulnerability allows a local application to escalate privileges on the system.
18) Input validation error (CVE-ID: CVE-2021-0872)
The vulnerability allows a local application to escalate privileges on the system.
The vulnerability exists due to insufficient input validation within PowerVR-GPU. A local application can execute arbitrary code with elevated privileges.
19) Input validation error (CVE-ID: CVE-2021-0873)
The vulnerability allows a local application to escalate privileges on the system.
The vulnerability exists due to insufficient input validation within PowerVR-GPU. A local application can execute arbitrary code with elevated privileges.
20) Input validation error (CVE-ID: CVE-2021-0875)
The vulnerability allows a local application to escalate privileges on the system.
The vulnerability exists due to insufficient input validation within PowerVR-GPU. A local application can execute arbitrary code with elevated privileges.
21) Input validation error (CVE-ID: CVE-2021-0885)
The vulnerability allows a local application to escalate privileges on the system.
The vulnerability exists due to insufficient input validation within PowerVR-GPU. A local application can execute arbitrary code with elevated privileges.
22) Input validation error (CVE-ID: CVE-2021-0876)
The vulnerability allows a local application to escalate privileges on the system.
The vulnerability exists due to insufficient input validation within PowerVR-GPU. A local application can execute arbitrary code with elevated privileges.
23) Input validation error (CVE-ID: CVE-2021-0878)
The vulnerability allows a local application to escalate privileges on the system.
The vulnerability exists due to insufficient input validation within PowerVR-GPU. A local application can execute arbitrary code with elevated privileges.
24) Input validation error (CVE-ID: CVE-2021-0879)
The vulnerability allows a local application to escalate privileges on the system.
The vulnerability exists due to insufficient input validation within PowerVR-GPU. A local application can execute arbitrary code with elevated privileges.
25) Input validation error (CVE-ID: CVE-2021-0880)
The vulnerability allows a local application to escalate privileges on the system.
The vulnerability exists due to insufficient input validation within PowerVR-GPU. A local application can execute arbitrary code with elevated privileges.
26) Input validation error (CVE-ID: CVE-2021-0881)
The vulnerability allows a local application to escalate privileges on the system.
The vulnerability exists due to insufficient input validation within PowerVR-GPU. A local application can execute arbitrary code with elevated privileges.
27) Input validation error (CVE-ID: CVE-2021-0882)
The vulnerability allows a local application to escalate privileges on the system.
The vulnerability exists due to insufficient input validation within PowerVR-GPU. A local application can execute arbitrary code with elevated privileges.
28) Input validation error (CVE-ID: CVE-2021-0883)
The vulnerability allows a local application to escalate privileges on the system.
The vulnerability exists due to insufficient input validation within PowerVR-GPU. A local application can execute arbitrary code with elevated privileges.
29) Input validation error (CVE-ID: CVE-2021-0884)
The vulnerability allows a local application to escalate privileges on the system.
The vulnerability exists due to insufficient input validation within PowerVR-GPU. A local application can execute arbitrary code with elevated privileges.
30) Buffer overflow (CVE-ID: CVE-2022-20463)
The vulnerability allows a local application to escalate privileges on the system.
The vulnerability exists due to a boundary error within the Wi-Fi component. A local application can trigger memory corruption and execute arbitrary code with elevated privileges.
31) Improper input validation (CVE-ID: CVE-2023-21091)
The vulnerability allows a local application to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the System component. A local application can perform a denial of service (DoS) attack.
32) Information exposure (CVE-ID: CVE-2023-20909)
The vulnerability allows a local application to gain access to sensitive information.
The vulnerability exists due to improper input validation within the System component. A local application can gain access to sensitive information.
33) Information exposure (CVE-ID: CVE-2023-21083)
The vulnerability allows a local application to gain access to sensitive information.
The vulnerability exists due to improper input validation within the System component. A local application can gain access to sensitive information.
34) Information exposure (CVE-ID: CVE-2023-21082)
The vulnerability allows a local application to gain access to sensitive information.
The vulnerability exists due to improper input validation within the System component. A local application can gain access to sensitive information.
35) Information exposure (CVE-ID: CVE-2023-21080)
The vulnerability allows a local application to gain access to sensitive information.
The vulnerability exists due to improper input validation within the System component. A local application can gain access to sensitive information.
36) Information exposure (CVE-ID: CVE-2023-20935)
The vulnerability allows a local application to gain access to sensitive information.
The vulnerability exists due to improper input validation within the System component. A local application can gain access to sensitive information.
37) Improper input validation (CVE-ID: CVE-2023-21099)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the System component. A local application can execute arbitrary code.
38) Improper input validation (CVE-ID: CVE-2023-20967)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the System component. A local application can execute arbitrary code.
39) Improper input validation (CVE-ID: CVE-2023-20950)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.
40) Improper input validation (CVE-ID: CVE-2023-21090)
The vulnerability allows a local application to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the Framework component. A local application can perform a denial of service (DoS) attack.
41) Improper input validation (CVE-ID: CVE-2023-21098)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.
42) Improper input validation (CVE-ID: CVE-2023-21097)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.
43) Improper input validation (CVE-ID: CVE-2023-21094)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.
44) Improper input validation (CVE-ID: CVE-2023-21092)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.
45) Improper input validation (CVE-ID: CVE-2023-21089)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.
46) Improper input validation (CVE-ID: CVE-2023-21088)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.
47) Improper input validation (CVE-ID: CVE-2023-21081)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.
48) Improper input validation (CVE-ID: CVE-2023-21085)
The vulnerability allows a remote attacker to execute arbitrary code.
The vulnerability exists due to improper input validation within the System component. A remote attacker can trick the victim to open a specially crafted file and execute arbitrary code.
49) Improper input validation (CVE-ID: CVE-2023-21087)
The vulnerability allows a local application to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the Framework component. A local application can perform a denial of service (DoS) attack.
50) Improper input validation (CVE-ID: CVE-2023-21100)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the System component. A local application can execute arbitrary code.
51) Improper input validation (CVE-ID: CVE-2023-21086)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the System component. A local application can execute arbitrary code.
52) Improper input validation (CVE-ID: CVE-2023-21093)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the MediaProvider component. A local application can execute arbitrary code.
53) Improper input validation (CVE-ID: CVE-2023-21084)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the System component. A local application can execute arbitrary code.
54) Improper input validation (CVE-ID: CVE-2023-21096)
The vulnerability allows a remote attacker to execute arbitrary code.
The vulnerability exists due to improper input validation within the System component. A remote attacker can trick the victim to open a specially crafted file and execute arbitrary code.
55) Information disclosure (CVE-ID: CVE-2022-20471)
The vulnerability allows a local application to gain access to potentially sensitive information.
The vulnerability exists due to unspecified error within the Bluetooth component. A local application can gain unauthorized access to sensitive information on the system.
56) Out-of-bounds write (CVE-ID: CVE-2022-32599)
The vulnerability allows a local privileged application to execute arbitrary code.
The vulnerability exists due to a logic error within rpmb. A local privileged application can execute arbitrary code.
57) Improper input validation (CVE-ID: CVE-2023-20652)
The vulnerability allows a local privileged application to execute arbitrary code.
The vulnerability exists due to a missing bounds check within keyinstall. A local privileged application can execute arbitrary code.
58) Improper input validation (CVE-ID: CVE-2023-20653)
The vulnerability allows a local privileged application to execute arbitrary code.
The vulnerability exists due to a missing bounds check within keyinstall. A local privileged application can execute arbitrary code.
59) Improper input validation (CVE-ID: CVE-2023-20654)
The vulnerability allows a local privileged application to execute arbitrary code.
The vulnerability exists due to a missing bounds check within keyinstall. A local privileged application can execute arbitrary code.
60) Improper input validation (CVE-ID: CVE-2023-20655)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to a parcel format mismatch within mmsdk. A local application can execute arbitrary code.
61) Write-what-where Condition (CVE-ID: CVE-2023-20656)
The vulnerability allows a local privileged application to execute arbitrary code.
The vulnerability exists due to a logic error within geniezone. A local privileged application can execute arbitrary code.
62) Out-of-bounds write (CVE-ID: CVE-2023-20657)
The vulnerability allows a local privileged application to execute arbitrary code.
The vulnerability exists due to a missing bounds check within mtee. A local privileged application can execute arbitrary code.
Remediation
Install update from vendor's website.