SB2023120445 - Multiple vulnerabilities in Google Android
Published: December 4, 2023 Updated: February 13, 2026
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 91 secuirty vulnerabilities.
1) Memory corruption (CVE-ID: CVE-2023-28550)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation in MPP Performance. A local application can execute arbitrary code.
2) Improper Validation of Array Index (CVE-ID: CVE-2023-33053)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation in Kernel. A local application can execute arbitrary code.
3) Use-after-free (CVE-ID: CVE-2023-33063)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error during a remote call from HLOS to DSP. A local user can trigger a use-after-free error and execute arbitrary code with elevated privileges.
Note, the vulnerability is being actively exploited in the wild.
4) Use of Out-of-range Pointer Offset (CVE-ID: CVE-2023-33079)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation in Audio. A local application can execute arbitrary code.
5) Buffer overflow (CVE-ID: CVE-2023-33087)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation in Core. A local application can execute arbitrary code.
6) Buffer overflow (CVE-ID: CVE-2023-33092)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation in Bluetooth HOST. A local application can execute arbitrary code.
7) Use of Out-of-range Pointer Offset (CVE-ID: CVE-2023-33106)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a boundary error while submitting a large list of sync points in an AUX command to the IOCTL_KGSL_GPU_AUX_COMMAND. A local user can trigger memory corruption and execute arbitrary code with elevated privileges.
Note, the vulnerability is being actively exploited in the wild.
8) Integer overflow (CVE-ID: CVE-2023-33107)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to integer overflow while assigning shared virtual memory region during IOCTL call. A local user can trigger an integer overflow and execute arbitrary code with elevated privileges.
Note, the vulnerability is being actively exploited in the wild.
9) Double Free (CVE-ID: CVE-2022-40507)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation in Core. A local application can execute arbitrary code.
10) Cryptographic Issues (CVE-ID: CVE-2022-22076)
The vulnerability allows a local application to gain access to sensitive information.
The vulnerability exists due to improper input validation in Core. A local application can gain access to sensitive information.
11) Key Management Errors (CVE-ID: CVE-2023-21652)
The vulnerability allows a local application to read and manipulate data.
The vulnerability exists due to improper input validation in HLOS. A local application can read and manipulate data.
12) Buffer overflow (CVE-ID: CVE-2023-21662)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation in Core Platform. A local application can execute arbitrary code.
13) Buffer overflow (CVE-ID: CVE-2023-21664)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation in Core Platform. A local application can execute arbitrary code.
14) Buffer overflow (CVE-ID: CVE-2023-28546)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation in SPS Applications. A local application can execute arbitrary code.
15) Memory corruption (CVE-ID: CVE-2023-28551)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation in UTILS. A local application can execute arbitrary code.
16) Incorrect Permission Assignment for Critical Resource (CVE-ID: CVE-2022-48459)
The vulnerability allows a local application to crash the entire system.
The vulnerability exists due to a possible system crash due to improper input validation within the TeleService in Android. A local application can crash the entire system.
17) Integer overflow (CVE-ID: CVE-2023-28585)
The vulnerability allows a local privileged application to execute arbitrary code.
The vulnerability exists due to improper input validation in TZ Secure OS. A local privileged application can execute arbitrary code.
18) Memory corruption (CVE-ID: CVE-2023-28586)
The vulnerability allows a local privileged application to gain access to sensitive information.
The vulnerability exists due to improper input validation in TZ Secure OS. A local privileged application can gain access to sensitive information.
19) Memory corruption (CVE-ID: CVE-2023-28587)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation in BT Controller. A local application can execute arbitrary code.
20) Buffer overflow (CVE-ID: CVE-2023-33017)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation in Boot. A local application can execute arbitrary code.
21) Integer overflow (CVE-ID: CVE-2023-33018)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation in User Identity Module. A local application can execute arbitrary code.
22) Integer overflow (CVE-ID: CVE-2023-33022)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation in HLOS. A local application can execute arbitrary code.
23) Improper Authentication (CVE-ID: CVE-2023-33054)
The vulnerability allows a remote attacker to read and manipulate data.
The vulnerability exists due to improper input validation in GPS HLOS Driver. A remote attacker can read and manipulate data.
24) Buffer over-read (CVE-ID: CVE-2023-33080)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation in WLAN Firmware. A remote attacker can perform a denial of service (DoS) attack.
25) Buffer over-read (CVE-ID: CVE-2023-33081)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation in WLAN Firmware. A remote attacker can perform a denial of service (DoS) attack.
26) NULL Pointer Dereference (CVE-ID: CVE-2023-33088)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation in WLAN Firmware. A local application can execute arbitrary code.
27) NULL Pointer Dereference (CVE-ID: CVE-2023-33089)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation in WLAN Firmware. A remote attacker can perform a denial of service (DoS) attack.
28) Buffer over-read (CVE-ID: CVE-2023-33097)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation in WLAN Firmware. A remote attacker can perform a denial of service (DoS) attack.
29) Buffer over-read (CVE-ID: CVE-2023-33098)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation in WLAN Firmware. A remote attacker can perform a denial of service (DoS) attack.
30) Integer overflow (CVE-ID: CVE-2023-28588)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation in Bluetooth Host. A remote attacker can perform a denial of service (DoS) attack.
31) Incorrect Permission Assignment for Critical Resource (CVE-ID: CVE-2022-48458)
The vulnerability allows a local application to crash the entire system.
The vulnerability exists due to a possible system crash due to improper input validation within the TeleService in Android. A local application can crash the entire system.
32) Input validation error (CVE-ID: CVE-2023-45866)
The vulnerability allows a remote attacker to compromise the affected system.
The vulnerability exists due to an unspecified vulnerability in Bluetooth implementation. A remote attacker with physical proximity to device can inject keystrokes by spoofing a keyboard and execute arbitrary commands on the system.
33) Input validation error (CVE-ID: CVE-2023-21401)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to an unspecified vulnerability in Linux kernel. A local user can execute arbitrary code with elevated privileges.
34) Use-after-free (CVE-ID: CVE-2023-3889)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error caused by improper GPU memory processing operations. A local user can trigger a use-after-free error and execute arbitrary code on the system.
35) Use-after-free (CVE-ID: CVE-2023-4272)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error. A local user can gain access to sensitive kernel data.
36) Buffer overflow (CVE-ID: CVE-2023-32804)
The vulnerability allows a local application to escalate privileges on the system.
The vulnerability exists due to a boundary error in Mali GPU Userspace Driver. A local application can trigger memory corruption and execute arbitrary code with elevated privileges.
37) Input validation error (CVE-ID: CVE-2023-21162)
The vulnerability allows a local application to escalate privileges on the system.
The vulnerability exists due to insufficient validation of user-supplied input in PowerVR-GPU. A local application can execute arbitrary code with elevated privileges.
38) Input validation error (CVE-ID: CVE-2023-21163)
The vulnerability allows a local application to escalate privileges on the system.
The vulnerability exists due to insufficient validation of user-supplied input in PowerVR-GPU. A local application can execute arbitrary code with elevated privileges.
39) Input validation error (CVE-ID: CVE-2023-21164)
The vulnerability allows a local application to escalate privileges on the system.
The vulnerability exists due to insufficient validation of user-supplied input in PowerVR-GPU. A local application can execute arbitrary code with elevated privileges.
40) Input validation error (CVE-ID: CVE-2023-21166)
The vulnerability allows a local application to escalate privileges on the system.
The vulnerability exists due to insufficient validation of user-supplied input in PowerVR-GPU. A local application can execute arbitrary code with elevated privileges.
41) Input validation error (CVE-ID: CVE-2023-21215)
The vulnerability allows a local application to escalate privileges on the system.
The vulnerability exists due to insufficient validation of user-supplied input in PowerVR-GPU. A local application can execute arbitrary code with elevated privileges.
42) Use-after-free (CVE-ID: CVE-2023-21216)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a use-after-free error in PowerVR GPU driver. A local user can trigger a use-after-free error and perform a denial of service (DoS) attack.
43) Input validation error (CVE-ID: CVE-2023-21217)
The vulnerability allows a local application to escalate privileges on the system.
The vulnerability exists due to insufficient validation of user-supplied input in PowerVR-GPU. A local application can execute arbitrary code with elevated privileges.
44) Input validation error (CVE-ID: CVE-2023-21218)
The vulnerability allows a local application to escalate privileges on the system.
The vulnerability exists due to insufficient validation of user-supplied input in PowerVR-GPU. A local application can execute arbitrary code with elevated privileges.
45) Input validation error (CVE-ID: CVE-2023-21228)
The vulnerability allows a local application to escalate privileges on the system.
The vulnerability exists due to insufficient validation of user-supplied input in PowerVR-GPU. A local application can execute arbitrary code with elevated privileges.
46) Input validation error (CVE-ID: CVE-2023-21263)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to an unspecified vulnerability in Linux kernel. A local user can execute arbitrary code with elevated privileges.
47) Input validation error (CVE-ID: CVE-2023-21402)
The vulnerability allows a local application to escalate privileges on the system.
The vulnerability exists due to insufficient validation of user-supplied input in PowerVR-GPU. A local application can execute arbitrary code with elevated privileges.
48) Incorrect Permission Assignment for Critical Resource (CVE-ID: CVE-2022-48457)
The vulnerability allows a local application to crash the entire system.
The vulnerability exists due to a possible system crash due to improper input validation within the TeleService in Android. A local application can crash the entire system.
49) Input validation error (CVE-ID: CVE-2023-21403)
The vulnerability allows a local application to escalate privileges on the system.
The vulnerability exists due to insufficient validation of user-supplied input in PowerVR-GPU. A local application can execute arbitrary code with elevated privileges.
50) Input validation error (CVE-ID: CVE-2023-35690)
The vulnerability allows a local application to escalate privileges on the system.
The vulnerability exists due to insufficient validation of user-supplied input in PowerVR-GPU. A local application can execute arbitrary code with elevated privileges.
51) Input validation error (CVE-ID: CVE-2023-21227)
The vulnerability allows a local application to escalate privileges on the system.
The vulnerability exists due to insufficient validation of user-supplied input in PowerVR-GPU. A local application can execute arbitrary code with elevated privileges.
52) Incorrect Comparison (CVE-ID: CVE-2023-32818)
The vulnerability allows a local privileged application to execute arbitrary code.
The vulnerability exists due to type confusion within vdec. A local privileged application can execute arbitrary code.
53) Out-of-bounds write (CVE-ID: CVE-2023-32847)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to a missing bounds check within audio. A local application can execute arbitrary code.
54) Incorrect Comparison (CVE-ID: CVE-2023-32848)
The vulnerability allows a local privileged application to execute arbitrary code.
The vulnerability exists due to type confusion within vdec. A local privileged application can execute arbitrary code.
55) Integer underflow (CVE-ID: CVE-2023-32850)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to an integer overflow within decoder. A local application can execute arbitrary code.
56) Incorrect Calculation of Buffer Size (CVE-ID: CVE-2023-32851)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to a missing bounds check within decoder. A local application can execute arbitrary code.
57) Input validation error (CVE-ID: CVE-2023-45779)
The vulnerability allows a local application to escalate privileges on the system.
The vulnerability exists due to insufficient validation of user-supplied input within the System UI in Misc OEM components. A local application can execute arbitrary code with elevated privileges.
58) Memory corruption (CVE-ID: CVE-2022-48456)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to a possible out of bounds write due to a incorrect bounds check within the camera driver in Kernel. A local application can execute arbitrary code.
59) Stack-based buffer overflow (CVE-ID: CVE-2022-48461)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to a possible out of bounds write due to a missing bounds check within the sensor driver in Kernel. A local application can execute arbitrary code.
60) Buffer overflow (CVE-ID: CVE-2022-48454)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to a possible out of bounds write due to a missing bounds check within the wifi service in Android. A local application can execute arbitrary code.
61) Buffer overflow (CVE-ID: CVE-2022-48455)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to a possible out of bounds write due to a missing bounds check within the wifi service in Android. A local application can execute arbitrary code.
62) Information exposure (CVE-ID: CVE-2023-45781)
The vulnerability allows a local application to gain access to sensitive information.
The vulnerability exists due to improper input validation within the System component. A local application can gain access to sensitive information.
63) Improper input validation (CVE-ID: CVE-2023-45776)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the System component. A local application can execute arbitrary code.
64) Information exposure (CVE-ID: CVE-2023-35668)
The vulnerability allows a local application to gain access to sensitive information.
The vulnerability exists due to improper input validation within the System component. A local application can gain access to sensitive information.
65) Information exposure (CVE-ID: CVE-2023-40098)
The vulnerability allows a local application to gain access to sensitive information.
The vulnerability exists due to improper input validation within the System component. A local application can gain access to sensitive information.
66) Information exposure (CVE-ID: CVE-2023-40083)
The vulnerability allows a local application to gain access to sensitive information.
The vulnerability exists due to improper input validation within the System component. A local application can gain access to sensitive information.
67) Improper input validation (CVE-ID: CVE-2023-45775)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the System component. A local application can execute arbitrary code.
68) Improper input validation (CVE-ID: CVE-2023-40090)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the System component. A local application can execute arbitrary code.
69) Improper input validation (CVE-ID: CVE-2023-40088)
The vulnerability allows a remote attacker to execute arbitrary code.
The vulnerability exists due to improper input validation within the System component. A remote attacker can trick the victim to open a specially crafted file and execute arbitrary code.
70) Improper input validation (CVE-ID: CVE-2023-40075)
The vulnerability allows a local application to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the Framework component. A local application can perform a denial of service (DoS) attack.
71) Improper input validation (CVE-ID: CVE-2023-40074)
The vulnerability allows a local application to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the Framework component. A local application can perform a denial of service (DoS) attack.
72) Information exposure (CVE-ID: CVE-2023-40092)
The vulnerability allows a local application to gain access to sensitive information.
The vulnerability exists due to improper input validation within the Framework component. A local application can gain access to sensitive information.
73) Information exposure (CVE-ID: CVE-2023-40073)
The vulnerability allows a local application to gain access to sensitive information.
The vulnerability exists due to improper input validation within the Framework component. A local application can gain access to sensitive information.
74) Improper input validation (CVE-ID: CVE-2023-40087)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the System component. A local application can execute arbitrary code.
75) Improper input validation (CVE-ID: CVE-2023-45774)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.
76) Improper input validation (CVE-ID: CVE-2023-40103)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.
77) Improper input validation (CVE-ID: CVE-2023-40096)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.
78) Improper input validation (CVE-ID: CVE-2023-40095)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.
79) Improper input validation (CVE-ID: CVE-2023-40094)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.
80) Improper input validation (CVE-ID: CVE-2023-45773)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the System component. A local application can execute arbitrary code.
81) Improper input validation (CVE-ID: CVE-2023-45777)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.
82) Improper input validation (CVE-ID: CVE-2023-40097)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the System component. A local application can execute arbitrary code.
83) Improper input validation (CVE-ID: CVE-2023-40078)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the System component. A local application can execute arbitrary code.
84) Improper input validation (CVE-ID: CVE-2023-40080)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the System component. A local application can execute arbitrary code.
85) Improper input validation (CVE-ID: CVE-2023-40084)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the System component. A local application can execute arbitrary code.
86) Improper input validation (CVE-ID: CVE-2023-40082)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the System component. A local application can execute arbitrary code.
87) Improper input validation (CVE-ID: CVE-2023-40091)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.
88) Improper input validation (CVE-ID: CVE-2023-40077)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.
89) Information exposure (CVE-ID: CVE-2023-40076)
The vulnerability allows a local application to gain access to sensitive information.
The vulnerability exists due to improper input validation within the Framework component. A local application can gain access to sensitive information.
90) Improper input validation (CVE-ID: CVE-2023-40089)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.
91) Improper input validation (CVE-ID: CVE-2023-40079)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.
Remediation
Install update from vendor's website.