SB2023020761 - Multiple vulnerabilities in Google Android



SB2023020761 - Multiple vulnerabilities in Google Android

Published: February 7, 2023 Updated: August 22, 2025

Security Bulletin ID SB2023020761
Severity
High
Patch available
YES
Number of vulnerabilities 39
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 5% Medium 15% Low 79%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 39 secuirty vulnerabilities.


1) Buffer overflow (CVE-ID: CVE-2022-40514)

The vulnerability allows a remote attacker to execute arbitrary code.

The vulnerability exists due to improper input validation in WLAN Firmware. A remote attacker can execute arbitrary code.


2) Buffer over-read (CVE-ID: CVE-2022-40512)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation in WLAN Firmware.. A remote attacker can perform a denial of service (DoS) attack.


3) Improper Input Validation (CVE-ID: CVE-2022-40502)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation in WLAN Host. A remote attacker can perform a denial of service (DoS) attack.


4) Improper Input Validation (CVE-ID: CVE-2022-34146)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation in WLAN Host. A remote attacker can perform a denial of service (DoS) attack.


5) Buffer over-read (CVE-ID: CVE-2022-34145)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation in WLAN Host. A remote attacker can perform a denial of service (DoS) attack.


6) Buffer over-read (CVE-ID: CVE-2022-33306)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to improper input validation in WLAN. A remote attacker can perform a denial of service (DoS) attack.


7) Buffer overflow (CVE-ID: CVE-2022-33277)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation in modem. A local application can execute arbitrary code.


8) Buffer over-read (CVE-ID: CVE-2022-33271)

The vulnerability allows a remote attacker to read and manipulate data.

The vulnerability exists due to improper input validation in WLAN. A remote attacker can read and manipulate data.


9) Integer overflow (CVE-ID: CVE-2022-33248)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation in User Identity Module. A local application can execute arbitrary code.


10) Configuration (CVE-ID: CVE-2022-33233)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation in modem. A local application can execute arbitrary code.


11) Buffer over-read (CVE-ID: CVE-2022-33221)

The vulnerability allows a local application to read and manipulate data.

The vulnerability exists due to improper input validation in Trusted Execution Environment. A local application can read and manipulate data.


12) Buffer overflow (CVE-ID: CVE-2022-33232)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation in Hypervisor. A local application can execute arbitrary code.


13) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-39189)

The vulnerability allows a guest user to escalate privileges on the system.

The vulnerability exists due to incorrect handling of TLB flush operations in certain KVM_VCPU_PREEMPTED situations in the x86 KVM subsystem in the Linux kernel. An attacker with unprivileged access to the guest OS can escalate privileges on the guest.


14) Access of Uninitialized Pointer (CVE-ID: CVE-2022-33280)

The vulnerability allows an attacker to read and manipulate data.

The vulnerability exists due to improper input validation in the Bluetooth HOST. An attacker with physical proximity to the device can trigger memory corruption by sending a specially crafted AVRCP packet and read or manipulate data.


15) Improper Access Control (CVE-ID: CVE-2022-33243)

The vulnerability allows a local application to execute arbitrary code.

The vulnerability exists due to improper input validation in Qualcomm IPC. A local application can execute arbitrary code.


16) OS command injection (CVE-ID: CVE-2022-47339)

The vulnerability allows a local privileged application to execute arbitrary code.

The vulnerability exists due to a OS command injection issue due to missing permission check within the cmd services in Android. A local privileged application can execute arbitrary code.


17) Out-of-bounds write (CVE-ID: CVE-2022-47331)

The vulnerability allows a local application to read, manipulate or delete data.

The vulnerability exists due to a race condition within the wlan driver in Kerenl. A local application can read, manipulate or delete data.


18) Out-of-bounds write (CVE-ID: CVE-2023-20602)

The vulnerability allows a local user to compromise vulnerable system.

The vulnerability exists due to a boundary error when processing untrusted input in ged. A local user can trigger out-of-bounds write and execute arbitrary code on the target system with elevated privileges.


19) Information disclosure (CVE-ID: CVE-2022-0850)

The vulnerability allows a local user to gain access to potentially sensitive information.

The vulnerability exists due to excessive data output in the copy_page_to_iter() function in iov_iter.c in Linux kernel. A local user can gain unauthorized access to sensitive information on the system.


20) Buffer overflow (CVE-ID: CVE-2023-20938)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to a boundary error within the Binder component in kernel. A local application can trigger memory corruption and execute arbitrary code with elevated privileges.

21) Buffer overflow (CVE-ID: CVE-2023-20937)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to a boundary error within the Android kernel. A local application can trigger memory corruption and execute arbitrary code with elevated privileges.


22) Use-after-free (CVE-ID: CVE-2022-41222)

The vulnerability allows a local user to gain access to sensitive information.

The vulnerability exists due to a use-after-free error caused by a stale TLB in mm/mremap.c, because an rmap lock is not held during a PUD move. A local user can gain access to sensitive information.


23) Integer overflow (CVE-ID: CVE-2022-39842)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to integer overflow within the pxa3xx_gcu_write() function in drivers/video/fbdev/pxa3xx-gcu.c in Linux kernel. A local user can trigger an integer overflow and execute arbitrary code with escalated privileges.



24) Input validation error (CVE-ID: CVE-2022-20455)

The vulnerability allows a local application to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of untrusted input within the Android System. A local application can pass specially crafted input to the system and perform a denial of service (DoS) attack.


25) Information disclosure (CVE-ID: CVE-2023-20948)

The vulnerability allows a local application to gain access to potentially sensitive information.

The vulnerability exists due to excessive data output by within the Android Framework. A local application can gain access to sensitive information.


26) Input validation error (CVE-ID: CVE-2023-20944)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to insufficient validation of untrusted input within the Android Framework. A local application can execute arbitrary code with elevated privileges.

27) Input validation error (CVE-ID: CVE-2023-20943)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to insufficient validation of untrusted input within the Android Framework. A local application can execute arbitrary code with elevated privileges.

28) Input validation error (CVE-ID: CVE-2023-20942)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to insufficient validation of untrusted input within the Android Framework. A local application can execute arbitrary code with elevated privileges.


29) Input validation error (CVE-ID: CVE-2023-20934)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to insufficient validation of untrusted input within the Android Framework. A local application can execute arbitrary code with elevated privileges.


30) Input validation error (CVE-ID: CVE-2022-20551)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to insufficient validation of untrusted input within the Android Framework. A local application can execute arbitrary code with elevated privileges.


31) Input validation error (CVE-ID: CVE-2022-20443)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to insufficient validation of untrusted input within the Android Framework. A local application can execute arbitrary code with elevated privileges.


32) Information disclosure (CVE-ID: CVE-2022-20481)

The vulnerability allows a local application to gain access to potentially sensitive information.

The vulnerability exists due to unspecified vulnerability in the Android System. A local application can gain access to sensitive information.


33) Information disclosure (CVE-ID: CVE-2023-20932)

The vulnerability allows a local application to gain access to potentially sensitive information.

The vulnerability exists due to unspecified vulnerability in the Android System. A local application can gain access to sensitive information.


34) Input validation error (CVE-ID: CVE-2023-20945)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to insufficient validation of untrusted input within the Android System. A local application can execute arbitrary code with elevated privileges.

35) Input validation error (CVE-ID: CVE-2023-20939)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to insufficient validation of untrusted input within the Android System. A local application can execute arbitrary code with elevated privileges.

36) Input validation error (CVE-ID: CVE-2023-20946)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to insufficient validation of untrusted input within the Android System. A local application can execute arbitrary code with elevated privileges.

37) Input validation error (CVE-ID: CVE-2023-20940)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to insufficient validation of untrusted input within the Android System. A local application can execute arbitrary code with elevated privileges.

38) Input validation error (CVE-ID: CVE-2023-20933)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to insufficient validation of untrusted input within the Android Media Framework. A local application can execute arbitrary code with elevated privileges.

39) Use-after-free (CVE-ID: CVE-2022-43680)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a use-after-free error caused by overeager destruction of a shared DTD in XML_ExternalEntityParserCreate. A remote attacker can trigger a use-after-free error and perform a denial of service (DoS) attack.


Remediation

Install update from vendor's website.