SB2023040440 - Multiple vulnerabilities in Google Android



SB2023040440 - Multiple vulnerabilities in Google Android

Published: April 4, 2023 Updated: January 15, 2024

Security Bulletin ID SB2023040440
Severity
High
Patch available
YES
Number of vulnerabilities 62
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 6% Medium 5% Low 89%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 62 secuirty vulnerabilities.


1) Buffer over-read (CVE-ID: CVE-2022-40503)

The vulnerability allows a remote attacker to read and manipulate data.

The vulnerability exists due to improper input validation in Bluetooth Host.. A remote attacker can read and manipulate data.


2) Double Free (CVE-ID: CVE-2022-33231)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation in Core. A local application can execute arbitrary code.


3) Buffer overflow (CVE-ID: CVE-2022-33288)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation in Core. A local application can execute arbitrary code.


4) Improper Validation of Array Index (CVE-ID: CVE-2022-33289)

The vulnerability allows a local attacker to execute arbitrary code.

The vulnerability exists due to improper input validation in Modem. A local attacker can execute arbitrary code.


5) Improper Validation of Array Index (CVE-ID: CVE-2022-33302)

The vulnerability allows a local attacker to execute arbitrary code.

The vulnerability exists due to improper input validation in User Identity Module. A local attacker can execute arbitrary code.


6) Integer overflow (CVE-ID: CVE-2022-33269)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation in Core. A local application can execute arbitrary code.


7) Time-of-check Time-of-use (TOCTOU) Race Condition (CVE-ID: CVE-2022-33270)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation in Modem. A remote attacker can perform a denial of service (DoS) attack.


8) Integer overflow (CVE-ID: CVE-2022-40532)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation in WLAN. A local application can execute arbitrary code.


9) Integer underflow (CVE-ID: CVE-2023-21630)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation in Multimedia Framework. A local application can execute arbitrary code.


10) Use-after-free (CVE-ID: CVE-2022-4696)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error in io_uring and the IORING_OP_SPLICE operation. A local user can trigger a use-after-free error and escalate privileges on the system.


11) Input validation error (CVE-ID: CVE-2021-0874)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to insufficient input validation within PowerVR-GPU. A local application can execute arbitrary code with elevated privileges.


12) Buffer overflow (CVE-ID: CVE-2023-20941)

The vulnerability allows a local application to execute arbitrary code with elevated privileges.

The vulnerability exists due to a boundary error in drivers/usb/gadget/function/f_accessory.c. A local application can trigger memory corruption and execute arbitrary code with elevated privileges.


13) Use-after-free (CVE-ID: CVE-2022-33917)

The vulnerability allows a local application to execute arbitrary code with escalated privileges.

The vulnerability exists due to a use-after-free error when processing GPU. A local application can execute arbitrary code with elevated privileges.


14) Use-after-free (CVE-ID: CVE-2022-36449)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to a use-after-free error. A local application can execute arbitrary code with elevated privileges.


15) Use-after-free (CVE-ID: CVE-2022-38181)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to a use-after-free error. A local application can trigger memory corruption and execute arbitrary code with elevated privileges.

Note, this vulnerability is known to be exploited in targeted attacks spotted in November 2022.


16) Use-after-free (CVE-ID: CVE-2022-41757)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to a use-after-free error. A local application can execute arbitrary code with elevated privileges.

17) Use-after-free (CVE-ID: CVE-2022-42716)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to a use-after-free error. A local application can execute arbitrary code with elevated privileges.

18) Input validation error (CVE-ID: CVE-2021-0872)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to insufficient input validation within PowerVR-GPU. A local application can execute arbitrary code with elevated privileges.


19) Input validation error (CVE-ID: CVE-2021-0873)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to insufficient input validation within PowerVR-GPU. A local application can execute arbitrary code with elevated privileges.


20) Input validation error (CVE-ID: CVE-2021-0875)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to insufficient input validation within PowerVR-GPU. A local application can execute arbitrary code with elevated privileges.


21) Input validation error (CVE-ID: CVE-2021-0885)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to insufficient input validation within PowerVR-GPU. A local application can execute arbitrary code with elevated privileges.


22) Input validation error (CVE-ID: CVE-2021-0876)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to insufficient input validation within PowerVR-GPU. A local application can execute arbitrary code with elevated privileges.


23) Input validation error (CVE-ID: CVE-2021-0878)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to insufficient input validation within PowerVR-GPU. A local application can execute arbitrary code with elevated privileges.


24) Input validation error (CVE-ID: CVE-2021-0879)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to insufficient input validation within PowerVR-GPU. A local application can execute arbitrary code with elevated privileges.


25) Input validation error (CVE-ID: CVE-2021-0880)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to insufficient input validation within PowerVR-GPU. A local application can execute arbitrary code with elevated privileges.


26) Input validation error (CVE-ID: CVE-2021-0881)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to insufficient input validation within PowerVR-GPU. A local application can execute arbitrary code with elevated privileges.


27) Input validation error (CVE-ID: CVE-2021-0882)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to insufficient input validation within PowerVR-GPU. A local application can execute arbitrary code with elevated privileges.


28) Input validation error (CVE-ID: CVE-2021-0883)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to insufficient input validation within PowerVR-GPU. A local application can execute arbitrary code with elevated privileges.


29) Input validation error (CVE-ID: CVE-2021-0884)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to insufficient input validation within PowerVR-GPU. A local application can execute arbitrary code with elevated privileges.


30) Buffer overflow (CVE-ID: CVE-2022-20463)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to a boundary error within the Wi-Fi component. A local application can trigger memory corruption and execute arbitrary code with elevated privileges.



31) Improper input validation (CVE-ID: CVE-2023-21091)

The vulnerability allows a local application to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the System component. A local application can perform a denial of service (DoS) attack.


32) Information exposure (CVE-ID: CVE-2023-20909)

The vulnerability allows a local application to gain access to sensitive information.

The vulnerability exists due to improper input validation within the System component. A local application can gain access to sensitive information.


33) Information exposure (CVE-ID: CVE-2023-21083)

The vulnerability allows a local application to gain access to sensitive information.

The vulnerability exists due to improper input validation within the System component. A local application can gain access to sensitive information.


34) Information exposure (CVE-ID: CVE-2023-21082)

The vulnerability allows a local application to gain access to sensitive information.

The vulnerability exists due to improper input validation within the System component. A local application can gain access to sensitive information.


35) Information exposure (CVE-ID: CVE-2023-21080)

The vulnerability allows a local application to gain access to sensitive information.

The vulnerability exists due to improper input validation within the System component. A local application can gain access to sensitive information.


36) Information exposure (CVE-ID: CVE-2023-20935)

The vulnerability allows a local application to gain access to sensitive information.

The vulnerability exists due to improper input validation within the System component. A local application can gain access to sensitive information.


37) Improper input validation (CVE-ID: CVE-2023-21099)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation within the System component. A local application can execute arbitrary code.


38) Improper input validation (CVE-ID: CVE-2023-20967)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation within the System component. A local application can execute arbitrary code.


39) Improper input validation (CVE-ID: CVE-2023-20950)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.


40) Improper input validation (CVE-ID: CVE-2023-21090)

The vulnerability allows a local application to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the Framework component. A local application can perform a denial of service (DoS) attack.


41) Improper input validation (CVE-ID: CVE-2023-21098)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.


42) Improper input validation (CVE-ID: CVE-2023-21097)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.


43) Improper input validation (CVE-ID: CVE-2023-21094)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.


44) Improper input validation (CVE-ID: CVE-2023-21092)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.


45) Improper input validation (CVE-ID: CVE-2023-21089)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.


46) Improper input validation (CVE-ID: CVE-2023-21088)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.


47) Improper input validation (CVE-ID: CVE-2023-21081)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.


48) Improper input validation (CVE-ID: CVE-2023-21085)

The vulnerability allows a remote attacker to execute arbitrary code.

The vulnerability exists due to improper input validation within the System component. A remote attacker can trick the victim to open a specially crafted file and execute arbitrary code.


49) Improper input validation (CVE-ID: CVE-2023-21087)

The vulnerability allows a local application to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation within the Framework component. A local application can perform a denial of service (DoS) attack.


50) Improper input validation (CVE-ID: CVE-2023-21100)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation within the System component. A local application can execute arbitrary code.


51) Improper input validation (CVE-ID: CVE-2023-21086)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation within the System component. A local application can execute arbitrary code.


52) Improper input validation (CVE-ID: CVE-2023-21093)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation within the MediaProvider component. A local application can execute arbitrary code.


53) Improper input validation (CVE-ID: CVE-2023-21084)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation within the System component. A local application can execute arbitrary code.


54) Improper input validation (CVE-ID: CVE-2023-21096)

The vulnerability allows a remote attacker to execute arbitrary code.

The vulnerability exists due to improper input validation within the System component. A remote attacker can trick the victim to open a specially crafted file and execute arbitrary code.


55) Information disclosure (CVE-ID: CVE-2022-20471)

The vulnerability allows a local application to gain access to potentially sensitive information.

The vulnerability exists due to unspecified error within the Bluetooth component. A local application can gain unauthorized access to sensitive information on the system.


56) Out-of-bounds write (CVE-ID: CVE-2022-32599)

The vulnerability allows a local privileged application to execute arbitrary code.

The vulnerability exists due to a logic error within rpmb. A local privileged application can execute arbitrary code.


57) Improper input validation (CVE-ID: CVE-2023-20652)

The vulnerability allows a local privileged application to execute arbitrary code.

The vulnerability exists due to a missing bounds check within keyinstall. A local privileged application can execute arbitrary code.


58) Improper input validation (CVE-ID: CVE-2023-20653)

The vulnerability allows a local privileged application to execute arbitrary code.

The vulnerability exists due to a missing bounds check within keyinstall. A local privileged application can execute arbitrary code.


59) Improper input validation (CVE-ID: CVE-2023-20654)

The vulnerability allows a local privileged application to execute arbitrary code.

The vulnerability exists due to a missing bounds check within keyinstall. A local privileged application can execute arbitrary code.


60) Improper input validation (CVE-ID: CVE-2023-20655)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to a parcel format mismatch within mmsdk. A local application can execute arbitrary code.


61) Write-what-where Condition (CVE-ID: CVE-2023-20656)

The vulnerability allows a local privileged application to execute arbitrary code.

The vulnerability exists due to a logic error within geniezone. A local privileged application can execute arbitrary code.


62) Out-of-bounds write (CVE-ID: CVE-2023-20657)

The vulnerability allows a local privileged application to execute arbitrary code.

The vulnerability exists due to a missing bounds check within mtee. A local privileged application can execute arbitrary code.


Remediation

Install update from vendor's website.