SB2023120445 - Multiple vulnerabilities in Google Android



SB2023120445 - Multiple vulnerabilities in Google Android

Published: December 4, 2023 Updated: February 13, 2026

Security Bulletin ID SB2023120445
Severity
High
Patch available
YES
Number of vulnerabilities 91
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 5% Medium 8% Low 87%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 91 secuirty vulnerabilities.


1) Memory corruption (CVE-ID: CVE-2023-28550)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation in MPP Performance. A local application can execute arbitrary code.


2) Improper Validation of Array Index (CVE-ID: CVE-2023-33053)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation in Kernel. A local application can execute arbitrary code.


3) Use-after-free (CVE-ID: CVE-2023-33063)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error during a remote call from HLOS to DSP. A local user can trigger a use-after-free error and execute arbitrary code with elevated privileges.

Note, the vulnerability is being actively exploited in the wild.


4) Use of Out-of-range Pointer Offset (CVE-ID: CVE-2023-33079)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation in Audio. A local application can execute arbitrary code.


5) Buffer overflow (CVE-ID: CVE-2023-33087)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation in Core. A local application can execute arbitrary code.


6) Buffer overflow (CVE-ID: CVE-2023-33092)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation in Bluetooth HOST. A local application can execute arbitrary code.


7) Use of Out-of-range Pointer Offset (CVE-ID: CVE-2023-33106)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a boundary error while submitting a large list of sync points in an AUX command to the IOCTL_KGSL_GPU_AUX_COMMAND. A local user can trigger memory corruption and execute arbitrary code with elevated privileges.

Note, the vulnerability is being actively exploited in the wild.


8) Integer overflow (CVE-ID: CVE-2023-33107)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to integer overflow while assigning shared virtual memory region during IOCTL call. A local user can trigger an integer overflow and execute arbitrary code with elevated privileges.

Note, the vulnerability is being actively exploited in the wild.


9) Double Free (CVE-ID: CVE-2022-40507)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation in Core. A local application can execute arbitrary code.


10) Cryptographic Issues (CVE-ID: CVE-2022-22076)

The vulnerability allows a local application to gain access to sensitive information.

The vulnerability exists due to improper input validation in Core. A local application can gain access to sensitive information.


11) Key Management Errors (CVE-ID: CVE-2023-21652)

The vulnerability allows a local application to read and manipulate data.

The vulnerability exists due to improper input validation in HLOS. A local application can read and manipulate data.


12) Buffer overflow (CVE-ID: CVE-2023-21662)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation in Core Platform. A local application can execute arbitrary code.


13) Buffer overflow (CVE-ID: CVE-2023-21664)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation in Core Platform. A local application can execute arbitrary code.


14) Buffer overflow (CVE-ID: CVE-2023-28546)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation in SPS Applications. A local application can execute arbitrary code.


15) Memory corruption (CVE-ID: CVE-2023-28551)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation in UTILS. A local application can execute arbitrary code.


16) Incorrect Permission Assignment for Critical Resource (CVE-ID: CVE-2022-48459)

The vulnerability allows a local application to crash the entire system.

The vulnerability exists due to a possible system crash due to improper input validation within the TeleService in Android. A local application can crash the entire system.


17) Integer overflow (CVE-ID: CVE-2023-28585)

The vulnerability allows a local privileged application to execute arbitrary code.

The vulnerability exists due to improper input validation in TZ Secure OS. A local privileged application can execute arbitrary code.


18) Memory corruption (CVE-ID: CVE-2023-28586)

The vulnerability allows a local privileged application to gain access to sensitive information.

The vulnerability exists due to improper input validation in TZ Secure OS. A local privileged application can gain access to sensitive information.


19) Memory corruption (CVE-ID: CVE-2023-28587)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation in BT Controller. A local application can execute arbitrary code.


20) Buffer overflow (CVE-ID: CVE-2023-33017)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation in Boot. A local application can execute arbitrary code.


21) Integer overflow (CVE-ID: CVE-2023-33018)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation in User Identity Module. A local application can execute arbitrary code.


22) Integer overflow (CVE-ID: CVE-2023-33022)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation in HLOS. A local application can execute arbitrary code.


23) Improper Authentication (CVE-ID: CVE-2023-33054)

The vulnerability allows a remote attacker to read and manipulate data.

The vulnerability exists due to improper input validation in GPS HLOS Driver. A remote attacker can read and manipulate data.


24) Buffer over-read (CVE-ID: CVE-2023-33080)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation in WLAN Firmware. A remote attacker can perform a denial of service (DoS) attack.


25) Buffer over-read (CVE-ID: CVE-2023-33081)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation in WLAN Firmware. A remote attacker can perform a denial of service (DoS) attack.


26) NULL Pointer Dereference (CVE-ID: CVE-2023-33088)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation in WLAN Firmware. A local application can execute arbitrary code.


27) NULL Pointer Dereference (CVE-ID: CVE-2023-33089)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation in WLAN Firmware. A remote attacker can perform a denial of service (DoS) attack.


28) Buffer over-read (CVE-ID: CVE-2023-33097)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation in WLAN Firmware. A remote attacker can perform a denial of service (DoS) attack.


29) Buffer over-read (CVE-ID: CVE-2023-33098)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation in WLAN Firmware. A remote attacker can perform a denial of service (DoS) attack.


30) Integer overflow (CVE-ID: CVE-2023-28588)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation in Bluetooth Host. A remote attacker can perform a denial of service (DoS) attack.


31) Incorrect Permission Assignment for Critical Resource (CVE-ID: CVE-2022-48458)

The vulnerability allows a local application to crash the entire system.

The vulnerability exists due to a possible system crash due to improper input validation within the TeleService in Android. A local application can crash the entire system.


32) Input validation error (CVE-ID: CVE-2023-45866)

The vulnerability allows a remote attacker to compromise the affected system.

The vulnerability exists due to an unspecified vulnerability in Bluetooth implementation. A remote attacker with physical proximity to device can inject keystrokes by spoofing a keyboard and execute arbitrary commands on the system.


33) Input validation error (CVE-ID: CVE-2023-21401)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to an unspecified vulnerability in Linux kernel. A local user can execute arbitrary code with elevated privileges.


34) Use-after-free (CVE-ID: CVE-2023-3889)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error caused by improper GPU memory processing operations. A local user can trigger a use-after-free error and execute arbitrary code on the system.


35) Use-after-free (CVE-ID: CVE-2023-4272)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error. A local user can gain access to sensitive kernel data.


36) Buffer overflow (CVE-ID: CVE-2023-32804)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to a boundary error in Mali GPU Userspace Driver. A local application can trigger memory corruption and execute arbitrary code with elevated privileges.


37) Input validation error (CVE-ID: CVE-2023-21162)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to insufficient validation of user-supplied input in PowerVR-GPU. A local application can execute arbitrary code with elevated privileges.


38) Input validation error (CVE-ID: CVE-2023-21163)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to insufficient validation of user-supplied input in PowerVR-GPU. A local application can execute arbitrary code with elevated privileges.


39) Input validation error (CVE-ID: CVE-2023-21164)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to insufficient validation of user-supplied input in PowerVR-GPU. A local application can execute arbitrary code with elevated privileges.


40) Input validation error (CVE-ID: CVE-2023-21166)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to insufficient validation of user-supplied input in PowerVR-GPU. A local application can execute arbitrary code with elevated privileges.


41) Input validation error (CVE-ID: CVE-2023-21215)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to insufficient validation of user-supplied input in PowerVR-GPU. A local application can execute arbitrary code with elevated privileges.


42) Use-after-free (CVE-ID: CVE-2023-21216)

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a use-after-free error in PowerVR GPU driver. A local user can trigger a use-after-free error and perform a denial of service (DoS) attack.


43) Input validation error (CVE-ID: CVE-2023-21217)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to insufficient validation of user-supplied input in PowerVR-GPU. A local application can execute arbitrary code with elevated privileges.


44) Input validation error (CVE-ID: CVE-2023-21218)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to insufficient validation of user-supplied input in PowerVR-GPU. A local application can execute arbitrary code with elevated privileges.


45) Input validation error (CVE-ID: CVE-2023-21228)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to insufficient validation of user-supplied input in PowerVR-GPU. A local application can execute arbitrary code with elevated privileges.


46) Input validation error (CVE-ID: CVE-2023-21263)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to an unspecified vulnerability in Linux kernel. A local user can execute arbitrary code with elevated privileges.


47) Input validation error (CVE-ID: CVE-2023-21402)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to insufficient validation of user-supplied input in PowerVR-GPU. A local application can execute arbitrary code with elevated privileges.


48) Incorrect Permission Assignment for Critical Resource (CVE-ID: CVE-2022-48457)

The vulnerability allows a local application to crash the entire system.

The vulnerability exists due to a possible system crash due to improper input validation within the TeleService in Android. A local application can crash the entire system.


49) Input validation error (CVE-ID: CVE-2023-21403)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to insufficient validation of user-supplied input in PowerVR-GPU. A local application can execute arbitrary code with elevated privileges.


50) Input validation error (CVE-ID: CVE-2023-35690)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to insufficient validation of user-supplied input in PowerVR-GPU. A local application can execute arbitrary code with elevated privileges.


51) Input validation error (CVE-ID: CVE-2023-21227)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to insufficient validation of user-supplied input in PowerVR-GPU. A local application can execute arbitrary code with elevated privileges.


52) Incorrect Comparison (CVE-ID: CVE-2023-32818)

The vulnerability allows a local privileged application to execute arbitrary code.

The vulnerability exists due to type confusion within vdec. A local privileged application can execute arbitrary code.


53) Out-of-bounds write (CVE-ID: CVE-2023-32847)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to a missing bounds check within audio. A local application can execute arbitrary code.


54) Incorrect Comparison (CVE-ID: CVE-2023-32848)

The vulnerability allows a local privileged application to execute arbitrary code.

The vulnerability exists due to type confusion within vdec. A local privileged application can execute arbitrary code.


55) Integer underflow (CVE-ID: CVE-2023-32850)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to an integer overflow within decoder. A local application can execute arbitrary code.


56) Incorrect Calculation of Buffer Size (CVE-ID: CVE-2023-32851)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to a missing bounds check within decoder. A local application can execute arbitrary code.


57) Input validation error (CVE-ID: CVE-2023-45779)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to insufficient validation of user-supplied input within the System UI in Misc OEM components. A local application can execute arbitrary code with elevated privileges.


58) Memory corruption (CVE-ID: CVE-2022-48456)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to a possible out of bounds write due to a incorrect bounds check within the camera driver in Kernel. A local application can execute arbitrary code.


59) Stack-based buffer overflow (CVE-ID: CVE-2022-48461)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to a possible out of bounds write due to a missing bounds check within the sensor driver in Kernel. A local application can execute arbitrary code.


60) Buffer overflow (CVE-ID: CVE-2022-48454)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to a possible out of bounds write due to a missing bounds check within the wifi service in Android. A local application can execute arbitrary code.


61) Buffer overflow (CVE-ID: CVE-2022-48455)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to a possible out of bounds write due to a missing bounds check within the wifi service in Android. A local application can execute arbitrary code.


62) Information exposure (CVE-ID: CVE-2023-45781)

The vulnerability allows a local application to gain access to sensitive information.

The vulnerability exists due to improper input validation within the System component. A local application can gain access to sensitive information.


63) Improper input validation (CVE-ID: CVE-2023-45776)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation within the System component. A local application can execute arbitrary code.


64) Information exposure (CVE-ID: CVE-2023-35668)

The vulnerability allows a local application to gain access to sensitive information.

The vulnerability exists due to improper input validation within the System component. A local application can gain access to sensitive information.


65) Information exposure (CVE-ID: CVE-2023-40098)

The vulnerability allows a local application to gain access to sensitive information.

The vulnerability exists due to improper input validation within the System component. A local application can gain access to sensitive information.


66) Information exposure (CVE-ID: CVE-2023-40083)

The vulnerability allows a local application to gain access to sensitive information.

The vulnerability exists due to improper input validation within the System component. A local application can gain access to sensitive information.


67) Improper input validation (CVE-ID: CVE-2023-45775)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation within the System component. A local application can execute arbitrary code.


68) Improper input validation (CVE-ID: CVE-2023-40090)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation within the System component. A local application can execute arbitrary code.


69) Improper input validation (CVE-ID: CVE-2023-40088)

The vulnerability allows a remote attacker to execute arbitrary code.

The vulnerability exists due to improper input validation within the System component. A remote attacker can trick the victim to open a specially crafted file and execute arbitrary code.


70) Improper input validation (CVE-ID: CVE-2023-40075)

The vulnerability allows a local application to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the Framework component. A local application can perform a denial of service (DoS) attack.


71) Improper input validation (CVE-ID: CVE-2023-40074)

The vulnerability allows a local application to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the Framework component. A local application can perform a denial of service (DoS) attack.


72) Information exposure (CVE-ID: CVE-2023-40092)

The vulnerability allows a local application to gain access to sensitive information.

The vulnerability exists due to improper input validation within the Framework component. A local application can gain access to sensitive information.


73) Information exposure (CVE-ID: CVE-2023-40073)

The vulnerability allows a local application to gain access to sensitive information.

The vulnerability exists due to improper input validation within the Framework component. A local application can gain access to sensitive information.


74) Improper input validation (CVE-ID: CVE-2023-40087)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation within the System component. A local application can execute arbitrary code.


75) Improper input validation (CVE-ID: CVE-2023-45774)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.


76) Improper input validation (CVE-ID: CVE-2023-40103)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.


77) Improper input validation (CVE-ID: CVE-2023-40096)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.


78) Improper input validation (CVE-ID: CVE-2023-40095)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.


79) Improper input validation (CVE-ID: CVE-2023-40094)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.


80) Improper input validation (CVE-ID: CVE-2023-45773)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation within the System component. A local application can execute arbitrary code.


81) Improper input validation (CVE-ID: CVE-2023-45777)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.


82) Improper input validation (CVE-ID: CVE-2023-40097)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation within the System component. A local application can execute arbitrary code.


83) Improper input validation (CVE-ID: CVE-2023-40078)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation within the System component. A local application can execute arbitrary code.


84) Improper input validation (CVE-ID: CVE-2023-40080)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation within the System component. A local application can execute arbitrary code.


85) Improper input validation (CVE-ID: CVE-2023-40084)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation within the System component. A local application can execute arbitrary code.


86) Improper input validation (CVE-ID: CVE-2023-40082)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation within the System component. A local application can execute arbitrary code.


87) Improper input validation (CVE-ID: CVE-2023-40091)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.


88) Improper input validation (CVE-ID: CVE-2023-40077)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.


89) Information exposure (CVE-ID: CVE-2023-40076)

The vulnerability allows a local application to gain access to sensitive information.

The vulnerability exists due to improper input validation within the Framework component. A local application can gain access to sensitive information.


90) Improper input validation (CVE-ID: CVE-2023-40089)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.


91) Improper input validation (CVE-ID: CVE-2023-40079)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.


Remediation

Install update from vendor's website.