SB2024090382 - Multiple vulnerabilities in Google Android
Published: September 3, 2024
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 35 secuirty vulnerabilities.
1) Buffer over-read (CVE-ID: CVE-2024-33050)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation in WLAN Host Communication. A remote attacker can perform a denial of service (DoS) attack.
2) Buffer over-read (CVE-ID: CVE-2024-33051)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to no check for IE length in WLAN Firmware. A remote attacker can perform a denial of service (DoS) attack.
3) Memory corruption (CVE-ID: CVE-2024-33016)
The vulnerability allows a local attacker to execute arbitrary code.
The vulnerability exists due to improper input validation in Storage. A local attacker can execute arbitrary code.
4) Use After Free (CVE-ID: CVE-2024-23365)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation in SCE-Mink. A local application can execute arbitrary code.
5) Buffer over-read (CVE-ID: CVE-2024-23364)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation in WLAN Firmware. A remote attacker can perform a denial of service (DoS) attack.
6) Input validation error (CVE-ID: CVE-2024-23362)
The vulnerability allows a local application to read and manipulate data.
The vulnerability exists due to improper input validation in Trusted Execution Environment. A local application can read and manipulate data.
7) Buffer over-read (CVE-ID: CVE-2024-23359)
The vulnerability allows a remote attacker to read and manipulate data.
The vulnerability exists due to improper input validation in Multi Mode Call Processor. A remote attacker can read and manipulate data.
8) Buffer over-read (CVE-ID: CVE-2024-23358)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation in Multi Mode Call Processor. A remote attacker can perform a denial of service (DoS) attack.
9) Use After Free (CVE-ID: CVE-2024-33060)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation in DSP Service. A local application can execute arbitrary code.
10) Buffer over-read (CVE-ID: CVE-2024-33057)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation in WLAN Host Communication. A remote attacker can perform a denial of service (DoS) attack.
11) Buffer overflow (CVE-ID: CVE-2024-33054)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation in Computer Vision. A local application can execute arbitrary code.
12) Buffer over-read (CVE-ID: CVE-2024-33048)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation in WLAN Host. A remote attacker can perform a denial of service (DoS) attack.
13) Out-of-bounds read (CVE-ID: CVE-2024-36972)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to an out-of-bounds read error within the queue_oob(), unix_stream_recv_urg() and manage_oob() functions in net/unix/af_unix.c. A local user can perform a denial of service (DoS) attack.
14) Return of Stack Variable Address (CVE-ID: CVE-2024-33045)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation in Buses. A local application can execute arbitrary code.
15) Buffer over-read (CVE-ID: CVE-2024-33043)
The vulnerability allows a local application to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation in FM Host. A local application can perform a denial of service (DoS) attack.
16) Untrusted Pointer Dereference (CVE-ID: CVE-2024-33038)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation in Computer Vision. A local application can execute arbitrary code.
17) Integer overflow (CVE-ID: CVE-2024-33035)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation in Display. A local application can execute arbitrary code.
18) Use After Free (CVE-ID: CVE-2024-33034)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation in Graphics Linux. A local application can execute arbitrary code.
19) Buffer overflow (CVE-ID: CVE-2024-33052)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation in FM Host. A local application can execute arbitrary code.
20) Buffer overflow (CVE-ID: CVE-2024-33042)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation in FM Host. A local application can execute arbitrary code.
21) Stack-based buffer overflow (CVE-ID: CVE-2024-39432)
The vulnerability allows a remote attacker to execute arbitrary code.
The vulnerability exists due to a possible out of bounds read due to a missing bounds check within the UMTS RLC driver in Modem. A remote attacker can execute arbitrary code.
22) Stack-based buffer overflow (CVE-ID: CVE-2024-39431)
The vulnerability allows a remote attacker to execute arbitrary code.
The vulnerability exists due to a possible out of bounds write due to a missing bounds check within the UMTS RLC driver in Modem. A remote attacker can execute arbitrary code.
23) Buffer overflow (CVE-ID: CVE-2024-31336)
The vulnerability allows a local application to escalate privileges on the system.
The vulnerability exists due to a boundary error in PowerVR-GPU component. A local application can trigger memory corruption and execute arbitrary code with elevated privileges.
24) Buffer overflow (CVE-ID: CVE-2024-23716)
The vulnerability allows a local application to escalate privileges on the system.
The vulnerability exists due to a boundary error in PowerVR-GPU component. A local application can trigger memory corruption and execute arbitrary code with elevated privileges.
25) Use-after-free (CVE-ID: CVE-2024-3655)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error. A local user can execute arbitrary code with elevated privileges.
26) Information exposure (CVE-ID: CVE-2024-40656)
The vulnerability allows a local application to gain access to sensitive information.
The vulnerability exists due to improper input validation within the System component. A local application can gain access to sensitive information.
27) Improper input validation (CVE-ID: CVE-2024-40658)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.
28) Improper input validation (CVE-ID: CVE-2024-40652)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the System component. A local application can execute arbitrary code.
29) Improper input validation (CVE-ID: CVE-2024-40659)
The vulnerability allows a local application to perform a denial of service (DoS) attack.
The vulnerability exists due to improper input validation within the System component. A local application can perform a denial of service (DoS) attack.
30) Improper input validation (CVE-ID: CVE-2024-40654)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the System component. A local application can execute arbitrary code.
31) Improper input validation (CVE-ID: CVE-2024-40655)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the System component. A local application can execute arbitrary code.
32) Improper input validation (CVE-ID: CVE-2024-40657)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the System component. A local application can execute arbitrary code.
33) Improper input validation (CVE-ID: CVE-2024-40662)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the Framework component. A local application can execute arbitrary code.
34) Improper input validation (CVE-ID: CVE-2024-40650)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the System component. A local application can execute arbitrary code.
35) Improper input validation (CVE-ID: CVE-2024-32896)
The vulnerability allows a local application to execute arbitrary code.
The vulnerability exists due to improper input validation within the Pixel Firmwire subcomponent in Pixel. A local application can execute arbitrary code.
Note, the vulnerability is being actively exploited in the wild.
Remediation
Install update from vendor's website.
References
- https://source.android.com/docs/security/bulletin/2024-09-01#2024-09-05-security-patch-level-vulnerability-details
- https://android.googlesource.com/platform/packages/services/Telecomm/+/f3e6a6c02439401eb7aeb3749ee5ec0b51a625b9
- https://source.android.com/docs/security/bulletin/2024-09-01
- https://android.googlesource.com/platform/frameworks/av/+/6d23fa05a40e5462d4b9bad28afa932e6e12a4f3
- https://android.googlesource.com/platform/packages/apps/Settings/+/2909433f7d59dcdd0c74044b1c8e9f48927193dc
- https://android.googlesource.com/platform/packages/modules/RemoteKeyProvisioning/+/c65dce4c6d8d54e47dce79a56e29e2223a2354e6
- https://android.googlesource.com/platform/packages/apps/Settings/+/f1d0079c91734168c150f839168544f407b17b06
- https://android.googlesource.com/platform/packages/services/Telecomm/+/eeef54b37a362f506ea3aa155baddc545b6a909a
- https://android.googlesource.com/platform/packages/apps/Settings/+/8261e0ade3b414fea61d7fe9d8bc6df7a3fc8603
- https://android.googlesource.com/platform/frameworks/base/+/e7af00cafb52a25933ec4edb80c5111d42af0237
- https://android.googlesource.com/platform/packages/apps/Settings/+/2968ccc911956fa5813a9a6a5e5c8970e383a60f