SB2022040802 - Multiple vulnerabilities in Google Android



SB2022040802 - Multiple vulnerabilities in Google Android

Published: April 8, 2022

Security Bulletin ID SB2022040802
Severity
High
Patch available
YES
Number of vulnerabilities 30
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 20% Medium 20% Low 60%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 30 secuirty vulnerabilities.


1) Time-of-check Time-of-use (TOCTOU) Race Condition (CVE-ID: CVE-2021-30342)

The vulnerability allows a remote attacker to compromise the affected system.

The vulnerability exists due to a race condition in LTE component between PDCP and RRC tasks when processing RRC Command packets. A remote attacker can send specially crafted packets to the device and execute arbitrary code on the system.


2) Out-of-bounds read (CVE-ID: CVE-2021-35100)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary condition when parsing Id3 tags in video processor. A remote attacker can create a specially crafted file, trick the victim into opening it, trigger an out-of-bounds read error and perform a denial of service (DoS) attack.


3) Improper access control (CVE-ID: CVE-2021-35070)

The vulnerability allows a local application to gain access to sensitive information.

The vulnerability exists due to improper access restrictions in kernel component due to improper SMMU configuration. A local application can gain access to sensitive information.


4) Buffer overflow (CVE-ID: CVE-2021-30350)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a boundary error within the core subsystem when processing MBN header. A local application can trigger buffer overflow and execute arbitrary code with elevated privileges.


5) Improper access control (CVE-ID: CVE-2021-30349)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to improper access restrictions AC database after memory allocation in core subsystem. A local application can escalate privileges on the system.


6) Improper access control (CVE-ID: CVE-2021-30346)

The vulnerability allows a local application to gain access to sensitive information.

The vulnerability exists due to improper SMMU configuration, which results in RPM secure Stream  accessing any secure resource. A local application can gain access to sensitive information.


7) Improper access control (CVE-ID: CVE-2021-30345)

The vulnerability allows a local application to gain access to sensitive information.

The vulnerability exists due to improper SMMU configuration, which results in RPM secure Stream  accessing any secure resource. A local application can gain access to sensitive information.


8) Improper Authorization (CVE-ID: CVE-2021-30344)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to improper authorization in the Multi-Mode Call Processor when handling replayed LTE security mode command. A remote attacker can send specially crafted packets to the device and perform a denial of service (DoS) attack.


9) Reachable Assertion (CVE-ID: CVE-2021-30340)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a reachable assertion when processing coreset in PDCCH configuration in SA mode in Modem. A remote attacker can send specially crafted packets to the system and perform a denial of service (DoS) attack.


10) Input validation error (CVE-ID: CVE-2021-30338)

The vulnerability allows a local application to gain access to sensitive information.

The vulnerability exists due to insufficient validation of user-supplied input in TrustZone memory transfer interface in core subsystem. A malicious application can gain access to sensitive information.


11) Improper access control (CVE-ID: CVE-2021-30281)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to improper access restrictions within the Core subsystem. A local application can execute arbitrary code with elevated privileges.


12) Buffer overflow (CVE-ID: CVE-2021-35104)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error when processing audio clips in Audio component. A remote attacker can create a specially crafted media file, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


13) Time-of-check Time-of-use (TOCTOU) Race Condition (CVE-ID: CVE-2021-30347)

The vulnerability allows a remote attacker to compromise the affected system.

The vulnerability exists due to a race condition between PDCP and RRC tasks in Modem component  when processing RPC Command packets. A remote attacker can send specially crafted packets to the device and execute arbitrary code on the system.

14) Time-of-check Time-of-use (TOCTOU) Race Condition (CVE-ID: CVE-2021-30343)

The vulnerability allows a remote attacker to compromise the affected system.

The vulnerability exists due to a race condition between PDCP and RRC tasks in Modem component  when processing RPC Command packets. A remote attacker can send specially crafted packets to the device and execute arbitrary code on the system.


15) Stack-based buffer overflow (CVE-ID: CVE-2021-30341)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in Data Modem when processing DSM packets. A remote unauthenticated attacker can send specially crafted DSM packets to the system, trigger a stack-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


16) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2021-39807)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to security restrictions bypass in System component. A local application can execute privileges on the system.


17) Key management errors (CVE-ID: CVE-2021-30339)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to improper key management when reading PRNG output. A malicious application can escalate privileges on the system.


18) Use-after-free (CVE-ID: CVE-2021-35130)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to a use-after-free error in layer support in graphics component. A local application can trigger a use-after-free error and execute arbitrary code with elevated privileges.


19) Race condition (CVE-ID: CVE-2021-35095)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to a race condition when handling queue client registrations in Linux kernel. A local application can exploit the race and gain unauthorized access to sensitive information and escalate privileges on the system.


20) Type conversion (CVE-ID: CVE-2021-35091)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to a type conversion error in Linux Graphics subsystem when handling page fault for global memory. A local application can trigger memory corruption and execute arbitrary code with elevated privileges.


21) Use-after-free (CVE-ID: CVE-2021-30334)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to a use-after-free error when checking DRM file status in Display component. A malicious application can trigger a use-after-fee error and execute arbitrary code with elevated privileges.


22) Buffer overflow (CVE-ID: CVE-2021-35123)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary within the Bluetooth HOST component when processing GATT multi notifications. An attacker with physical access to device can send specially crafted packets to the device, trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


23) Improper access control (CVE-ID: CVE-2021-35112)

The vulnerability allows a malicious application to escalate privileges on the system.

The vulnerability exists due to improper access control in register configuration within the Graphics component. A malicious application can bypass implemented security restrictions and escalate privileges on the system.


24) Buffer overflow (CVE-ID: CVE-2021-35081)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error when processing SSID length received from beacon or probe response during an IBSS session. A remote attacker can send specially crafted traffic to the device, trigger memory corruption and execute arbitrary code on the target system.



25) Double Free (CVE-ID: CVE-2021-25477)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a double free error within the Modem LTE RRC when decoding an incorrect ASN.1 data. A remote attacker can pass specially crafted data to the system, trigger a double free error and perform a denial of service (DoS) attack.


26) Improper Certificate Validation (CVE-ID: CVE-2022-20081)

The vulnerability allows a remote attacker to perform MitM attack.

The vulnerability exists due to improper improper certificate validation in A-GPS. A remote attacker can perform MitM attack.


27) Information disclosure (CVE-ID: CVE-2021-39800)

The vulnerability allows a local user to gain access to potentially sensitive information.

The vulnerability exists due to excessive data output in ION handle in Linux kernel. A local user can gain access to sensitive information.


28) Buffer overflow (CVE-ID: CVE-2021-39802)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a boundary error in Scudo memory allocator  in Linux kernel. A local user can trigger memory corruption and execute arbitrary code with elevated privileges.


29) Use-after-free (CVE-ID: CVE-2021-39801)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error in ION_IOC_ALLOC in Linux kernel. A local user can send a specially crafted IOCTL request, trigger a use-after-free error and execute arbitrary code with elevated privileges.


30) Use-after-free (CVE-ID: CVE-2021-0707)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to a use-after-free error in dma_buf. A local user can trigger a race between closing the dmabuf file and reading the dmabuf's debug info and execute arbitrary code with elevated privileges.


Remediation

Install update from vendor's website.