SB2024110465 - Multiple vulnerabilities in Google Android
Published: November 4, 2024 Updated: March 3, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 39 secuirty vulnerabilities.
1) Buffer over-read (CVE-ID: CVE-2024-38405)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation in WLAN Host. A remote attacker can perform a denial of service (DoS) attack.
2) Improper input validation (CVE-ID: CVE-2024-43093)
The vulnerability allows a local application to escalate privileges on the system.
The vulnerability exists due to improper input validation within the Framework Documents UI component. A local application can execute arbitrary code with elevated privileges.
Note, the vulnerability is being actively exploited in the wild.
3) Use After Free (CVE-ID: CVE-2024-38424)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation in GPS. A local application can execute arbitrary code.
4) Buffer over-read (CVE-ID: CVE-2024-38403)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation in WLAN Firmware. A remote attacker can perform a denial of service (DoS) attack.
5) Reachable Assertion (CVE-ID: CVE-2024-23385)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation in Modem. A remote attacker can perform a denial of service (DoS) attack.
6) Cryptographic Issues (CVE-ID: CVE-2024-38408)
The vulnerability allows a remote attacker to read and manipulate data.
The vulnerability exists due to improper input validation in BT Controller. A remote attacker can read and manipulate data.
7) Use After Free (CVE-ID: CVE-2024-43047)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation in DSP Service. A local application can execute arbitrary code.
Note, the vulnerability is being actively exploited in the wild.
8) Buffer overflow (CVE-ID: CVE-2024-38423)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation in Graphics Linux. A local application can execute arbitrary code.
9) Integer overflow (CVE-ID: CVE-2024-38422)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation in Audio. A local application can execute arbitrary code.
10) Use After Free (CVE-ID: CVE-2024-38421)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation in Graphics Linux. A local application can execute arbitrary code.
11) Use After Free (CVE-ID: CVE-2024-38415)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation in Computer Vision. A local application can execute arbitrary code.
12) Use After Free (CVE-ID: CVE-2024-38402)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation in DSP Services. A local application can execute arbitrary code.
13) Out-of-bounds read (CVE-ID: CVE-2024-36978)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the multiq_tune() function in net/sched/sch_multiq.c. A local user can perform a denial of service (DoS) attack.
14) Untrusted Pointer Dereference (CVE-ID: CVE-2024-21455)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation in DSP Service. A local application can execute arbitrary code.
15) Type confusion (CVE-ID: CVE-2024-20106)
The vulnerability allows a local privileged application to execute arbitrary code.
The vulnerability exists due to a missing bounds check within m4u. A local privileged application can execute arbitrary code.
16) Out-of-bounds write (CVE-ID: CVE-2024-20104)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to a missing bounds check within DA. A local application can execute arbitrary code.
17) Input validation error (CVE-ID: CVE-2024-34729)
The vulnerability allows a local application to escalate privileges on the system.
The vulnerability exists due to improper input validation in PowerVR-GPU. A local application can execute arbitrary code with elevated privileges.
18) Input validation error (CVE-ID: CVE-2024-31337)
The vulnerability allows a local application to escalate privileges on the system.
The vulnerability exists due to improper input validation in PowerVR-GPU. A local application can execute arbitrary code with elevated privileges.
19) Input validation error (CVE-ID: CVE-2024-23715)
The vulnerability allows a local application to escalate privileges on the system.
The vulnerability exists due to improper input validation in PowerVR-GPU. A local application can execute arbitrary code with elevated privileges.
20) Input validation error (CVE-ID: CVE-2023-35686)
The vulnerability allows a local application to escalate privileges on the system.
The vulnerability exists due to improper input validation in PowerVR-GPU. A local application can execute arbitrary code with elevated privileges.
21) Input validation error (CVE-ID: CVE-2023-35659)
The vulnerability allows a local application to escalate privileges on the system.
The vulnerability exists due to improper input validation in PowerVR-GPU. A local application can execute arbitrary code with elevated privileges.
22) Input validation error (CVE-ID: CVE-2024-40671)
The vulnerability allows a local application to escalate privileges on the system.
The vulnerability exists due to improper input validation in PowerVR-GPU. A local application can execute arbitrary code with elevated privileges.
23) Input validation error (CVE-ID: CVE-2024-34747)
The vulnerability allows a local application to escalate privileges on the system.
The vulnerability exists due to improper input validation in PowerVR-GPU. A local application can execute arbitrary code with elevated privileges.
24) Use-after-free (CVE-ID: CVE-2024-46740)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the binder_transaction() function in drivers/android/binder.c. A local user can escalate privileges on the system.
25) Improper input validation (CVE-ID: CVE-2024-43083)
The vulnerability allows a local application to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the System component. A local application can perform a denial of service (DoS) attack.
26) Improper input validation (CVE-ID: CVE-2024-43091)
The vulnerability allows a remote attacker to execute arbitrary code.
The vulnerability exists due to improper input validation within the System component. A remote attacker can trick the victim to open a specially crafted file and execute arbitrary code.
27) Improper input validation (CVE-ID: CVE-2024-40661)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the System component. A local application can execute arbitrary code.
28) Information exposure (CVE-ID: CVE-2024-43084)
The vulnerability allows a local application to gain access to sensitive information.
The vulnerability exists due to improper input validation within the Framework component. A local application can gain access to sensitive information.
29) Information exposure (CVE-ID: CVE-2024-43082)
The vulnerability allows a local application to gain access to sensitive information.
The vulnerability exists due to improper input validation within the Framework component. A local application can gain access to sensitive information.
30) Information exposure (CVE-ID: CVE-2024-43086)
The vulnerability allows a local application to gain access to sensitive information.
The vulnerability exists due to improper input validation within the Framework component. A local application can gain access to sensitive information.
31) Information exposure (CVE-ID: CVE-2024-43090)
The vulnerability allows a local application to gain access to sensitive information.
The vulnerability exists due to improper input validation within the System component. A local application can gain access to sensitive information.
32) Improper input validation (CVE-ID: CVE-2024-43089)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the System component. A local application can execute arbitrary code.
33) Improper input validation (CVE-ID: CVE-2024-43088)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the System component. A local application can execute arbitrary code.
34) Improper input validation (CVE-ID: CVE-2024-43087)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the System component. A local application can execute arbitrary code.
35) Improper input validation (CVE-ID: CVE-2024-43080)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the System component. A local application can execute arbitrary code.
36) Improper input validation (CVE-ID: CVE-2024-34719)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the System component. A local application can execute arbitrary code.
37) Improper input validation (CVE-ID: CVE-2024-43085)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.
38) Improper input validation (CVE-ID: CVE-2024-43081)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.
39) Improper input validation (CVE-ID: CVE-2024-40660)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.
Remediation
Install update from vendor's website.
References
- https://source.android.com/docs/security/bulletin/2024-11-01
- https://android.googlesource.com/platform/packages/modules/Wifi/+/62f61e19524e9a55cadd1116c9448ff34b977e50
- https://android.googlesource.com/platform/external/skia/+/0b628a960e74197ace9831ef0727f5ba7ab6ac10
- https://android.googlesource.com/platform/packages/modules/Permission/+/ffd81f212b5594b498f0ba07645c7a181540e494
- https://android.googlesource.com/platform/frameworks/base/+/50eec20b570cd4cbbe8c5971af4c9dda3ddcb858
- https://android.googlesource.com/platform/frameworks/base/+/6aa1b4fbf5936a1ff5bdbb79397c94910a6ed8f5
- https://android.googlesource.com/platform/frameworks/base/+/55a3d36701bb874358f685d3ac3381eda10fcff0
- https://android.googlesource.com/platform/frameworks/base/+/4677d3ee0ec2d31acc6108fea7be6cced971da37
- https://android.googlesource.com/platform/packages/providers/MediaProvider/+/33ff6a663eea1fcdd2b422b98722c1dee48a7f6a
- https://android.googlesource.com/platform/packages/apps/Settings/+/975c28535419be1cc45f66712f41e4a7a40e6001
- https://android.googlesource.com/platform/packages/apps/Settings/+/6253b87704bb097ad9963941bdddf3b86906a73e
- https://android.googlesource.com/platform/packages/apps/Settings/+/26ce013dfd7e59a451acc66e7f05564e0884d46b
- https://android.googlesource.com/platform/packages/modules/Bluetooth/+/b0e4375577ba7e21bd40edac5990bea418ecdc8c
- https://android.googlesource.com/platform/frameworks/base/+/2457d4e459ee6ffd099b9ff7cce9c83119c3ce66
- https://android.googlesource.com/platform/frameworks/base/+/31c098c4271ad4fdfb3809e05017ead8d9f6580f
- https://android.googlesource.com/platform/frameworks/native/+/064ce6e3235b6318be1e41f1bac9595a98e4aafa