SB20240805114 - Multiple vulnerabilities in Google Android



SB20240805114 - Multiple vulnerabilities in Google Android

Published: August 5, 2024 Updated: October 9, 2024

Security Bulletin ID SB20240805114
Severity
Critical
Patch available
YES
Number of vulnerabilities 45
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

Critical 2% High 2% Medium 33% Low 62%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 45 secuirty vulnerabilities.


1) Buffer over-read (CVE-ID: CVE-2024-33019)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation in WLAN Host. A remote attacker can perform a denial of service (DoS) attack.


2) NULL Pointer Dereference (CVE-ID: CVE-2024-23357)

The vulnerability allows a local application to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation in HLOS. A local application can perform a denial of service (DoS) attack.


3) Memory corruption (CVE-ID: CVE-2024-23356)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation in HLOS. A local application can execute arbitrary code.


4) Memory corruption (CVE-ID: CVE-2024-23355)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation in Automotive. A local application can execute arbitrary code.


5) Buffer over-read (CVE-ID: CVE-2024-23353)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation in Multi Mode Call Processor. A remote attacker can perform a denial of service (DoS) attack.


6) Loop with Unreachable Exit Condition ('Infinite Loop') (CVE-ID: CVE-2024-23352)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation in Multi Mode Call Processor. A remote attacker can perform a denial of service (DoS) attack.


7) Memory corruption (CVE-ID: CVE-2024-21481)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation in Hypervisor. A local application can execute arbitrary code.


8) Reachable Assertion (CVE-ID: CVE-2024-23350)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation in Multi Mode Call Processor. A remote attacker can perform a denial of service (DoS) attack.


9) Use After Free (CVE-ID: CVE-2024-33028)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation in Automotive Telematics. A local application can execute arbitrary code.


10) Improper Access Control (CVE-ID: CVE-2024-33027)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation in Graphics Linux. A local application can execute arbitrary code.


11) Buffer over-read (CVE-ID: CVE-2024-33026)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation in WLAN Host. A remote attacker can perform a denial of service (DoS) attack.


12) Buffer over-read (CVE-ID: CVE-2024-33025)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation in WLAN Host. A remote attacker can perform a denial of service (DoS) attack.


13) Integer overflow (CVE-ID: CVE-2024-33024)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation in WLAN Host. A remote attacker can perform a denial of service (DoS) attack.


14) Use After Free (CVE-ID: CVE-2024-33023)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation in Graphics Linux. A local application can execute arbitrary code.


15) Buffer over-read (CVE-ID: CVE-2024-33020)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation in WLAN HOST. A remote attacker can perform a denial of service (DoS) attack.


16) Buffer over-read (CVE-ID: CVE-2024-33018)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation in WLAN Host. A remote attacker can perform a denial of service (DoS) attack.


17) Use-after-free (CVE-ID: CVE-2024-36971)

The vulnerability allows a remote attacker to execute arbitrary code on the system.

The vulnerability exists due to a use-after-free error within the xfrm_link_failure() function in net/xfrm/xfrm_policy.c, within the dst_entry ip6_dst_check() and ip6_dst_check() functions in net/ipv6/route.c, within the dst_entry ipv4_dst_check() and ip_do_redirect() functions in net/ipv4/route.c. A remote attacker can send specially crafted packets to the system and execute arbitrary code.

Note, the vulnerability is being actively exploited in the wild.


18) Use After Free (CVE-ID: CVE-2024-23382)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation in Graphics Linux. A local application can execute arbitrary code.


19) Use-after-free (CVE-ID: CVE-2024-2937)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error. A local user can execute arbitrary code with elevated privileges.


20) Use-after-free (CVE-ID: CVE-2024-4607)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error. A local user can execute arbitrary code with elevated privileges.

21) Input validation error (CVE-ID: CVE-2024-31333)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to insufficient validation of user-supplied input in PowerVR-GPU. A local application can execute arbitrary code with elevated privileges.


22) Memory corruption (CVE-ID: CVE-2024-20082)

The vulnerability allows a remote attacker to execute arbitrary code.

The vulnerability exists due to a missing bounds check within Modem. A remote attacker can trick the victim to open a specially crafted file and execute arbitrary code.


23) Type conversion (CVE-ID: CVE-2024-21478)

The vulnerability allows a local application to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation in Graphics. A local application can perform a denial of service (DoS) attack.


24) Use After Free (CVE-ID: CVE-2024-23381)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation in Graphics Linux. A local application can execute arbitrary code.


25) Use After Free (CVE-ID: CVE-2024-23383)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation in Graphics Linux. A local application can execute arbitrary code.


26) Buffer over-read (CVE-ID: CVE-2024-33015)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation in WLAN Host. A remote attacker can perform a denial of service (DoS) attack.


27) Use After Free (CVE-ID: CVE-2024-23384)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation in Graphics Linux. A local application can execute arbitrary code.


28) Use After Free (CVE-ID: CVE-2024-33010)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation in WLAN Host. A remote attacker can perform a denial of service (DoS) attack.


29) Buffer over-read (CVE-ID: CVE-2024-33011)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation in WLAN Host. A remote attacker can perform a denial of service (DoS) attack.


30) Buffer over-read (CVE-ID: CVE-2024-33012)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation in WLAN Host. A remote attacker can perform a denial of service (DoS) attack.


31) Buffer over-read (CVE-ID: CVE-2024-33013)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation in WLAN Host. A remote attacker can perform a denial of service (DoS) attack.


32) Buffer over-read (CVE-ID: CVE-2024-33014)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation in WLAN Host. A remote attacker can perform a denial of service (DoS) attack.


33) Improper input validation (CVE-ID: CVE-2024-34741)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.


34) Improper input validation (CVE-ID: CVE-2024-34737)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.


35) Improper input validation (CVE-ID: CVE-2024-34735)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.


36) Improper input validation (CVE-ID: CVE-2024-34734)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.


37) Improper input validation (CVE-ID: CVE-2024-34731)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.


38) Improper input validation (CVE-ID: CVE-2024-34742)

The vulnerability allows a local application to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the Framework component. A local application can perform a denial of service (DoS) attack.


39) Improper input validation (CVE-ID: CVE-2024-34738)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.


40) Information exposure (CVE-ID: CVE-2024-34727)

The vulnerability allows a local application to gain access to sensitive information.

The vulnerability exists due to improper input validation within the System component. A local application can gain access to sensitive information.


41) Information exposure (CVE-ID: CVE-2024-34736)

The vulnerability allows a local application to gain access to sensitive information.

The vulnerability exists due to improper input validation within the Framework component. A local application can gain access to sensitive information.


42) Improper input validation (CVE-ID: CVE-2024-34743)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.


43) Improper input validation (CVE-ID: CVE-2024-34740)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.


44) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2023-20971)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to an unspecified error in in Android Framework. A local application can execute arbitrary code with elevated privileges.


45) Improper input validation (CVE-ID: CVE-2023-21351)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.


Remediation

Install update from vendor's website.

References