SB2022080335 - Multiple vulnerabilities in Google Android
Published: August 3, 2022
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 19 secuirty vulnerabilities.
1) Buffer overflow (CVE-ID: CVE-2022-22080)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error in Audio component when validating backend id in PCM routing process. A remote attacker can trick the victim into opening a specially crafted file, trigger memory corruption and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
2) Double Free (CVE-ID: CVE-2022-25668)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error when handling ASF clips. A remote attacker can trick the victim to open a specially crafted video file, trigger a double free error and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
3) Buffer overflow (CVE-ID: CVE-2022-22070)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error when processing entries in ARP routing table in Video component. A remote attacker on the local network can trigger memory corruption and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
4) Cryptographic issues (CVE-ID: CVE-2022-22069)
The vulnerability allows a local application to gain access to sensitive information.
The vulnerability exists due to devices with keyprotect off may store unencrypted keybox in RPMB. A local application can gain access to potentially sensitive information.
5) Memory leak (CVE-ID: CVE-2022-22067)
The vulnerability allows a remote attacker to perform DoS attack on the target system.
The vulnerability exists due memory leak when processing NSA RRC Reconfiguration with invalid Radio Bearer Config. A remote attacker can send specially crafted traffic to the system, force it to leak memory and perform denial of service attack.
6) Out-of-bounds read (CVE-ID: CVE-2022-22062)
The vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to a boundary condition in Data Modem. A remote attacker can pass specially crafted content to the system, trigger an out-of-bounds read error and read contents of memory on the system.
7) Out-of-bounds write (CVE-ID: CVE-2022-22061)
The vulnerability allows a local application to escalate privileges on the system.
The vulnerability exists due to a boundary error when verifying device IDs. A local application can trigger an out-of-bounds write and execute arbitrary code with elevated privileges.
8) Improper Validation of Array Index (CVE-ID: CVE-2022-22059)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to a boundary error when processing video content. A remote attacker can create a specially crafted video file, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
9) Input validation error (CVE-ID: CVE-2021-30259)
The vulnerability allows a local user to execute arbitrary code on the system.
The vulnerability exists due to improper validation of function table entries in Audio. A local user can pass specially crafted input to the application and execute arbitrary code on the target system.
10) Input validation error (CVE-ID: CVE-2022-20239)
The vulnerability allows a local application to escalate privileges on the system.
The vulnerability exists due to unspecified vulnerability in Unisoc VSP. A local application can execute arbitrary code with elevated privileges.
11) Use-after-free (CVE-ID: CVE-2022-1786)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error in the Linux kernel’s io_uring subsystem in the way a user sets up a ring with IORING_SETUP_IOPOLL with more than one task completing submissions on this ring. A local user can trigger use-after-free to crash the system or escalate their privileges.
12) Race condition (CVE-ID: CVE-2022-20082)
The vulnerability allows a local application to escalate privileges on the system.
The vulnerability exists due to a race condition in GPU component. A local application can exploit the race to trigger a use-after-free error and escalate privileges on the system.
13) Input validation error (CVE-ID: CVE-2022-20122)
The vulnerability allows a local application to escalate privileges on the system.
The vulnerability exists due to unspecified vulnerability in the PowerVR-GPU kernel driver. A local application can execute arbitrary code with elevated privileges.
14) Input validation error (CVE-ID: CVE-2021-39815)
The vulnerability allows a local application to escalate privileges on the system.
The vulnerability exists due to unspecified vulnerability in the PowerVR-GPU kernel driver. A local application can execute arbitrary code with elevated privileges.
15) Input validation error (CVE-ID: CVE-2021-0947)
The vulnerability allows a local application to escalate privileges on the system.
The vulnerability exists due to unspecified vulnerability in the PowerVR-GPU kernel driver. A local application can execute arbitrary code with elevated privileges.
16) Input validation error (CVE-ID: CVE-2021-0946)
The vulnerability allows a local application to escalate privileges on the system.
The vulnerability exists due to unspecified vulnerability in the PowerVR-GPU kernel driver. A local application can execute arbitrary code with elevated privileges.
17) Input validation error (CVE-ID: CVE-2021-0891)
The vulnerability allows a local application to escalate privileges on the system.
The vulnerability exists due to unspecified vulnerability in the PowerVR-GPU kernel driver. A local application can execute arbitrary code with elevated privileges.
18) Input validation error (CVE-ID: CVE-2021-0887)
The vulnerability allows a local application to escalate privileges on the system.
The vulnerability exists due to unspecified vulnerability in the PowerVR-GPU kernel driver. A local application can execute arbitrary code with elevated privileges.
19) Input validation error (CVE-ID: CVE-2021-0698)
The vulnerability allows a local application to escalate privileges on the system.
The vulnerability exists due to unspecified vulnerability in the PowerVR-GPU kernel driver. A local application can execute arbitrary code with elevated privileges.
Remediation
Install update from vendor's website.