Description:
Google has released Android Security Bulletin February 2024 to fix multiple vulnerabilities in Android operating system. The list of patches can be found at:
https://source.android.com/docs/security/bulletin/2024-02-01
Affected Systems:
- Android version 11, 12, 12L, 13 and 14
Impact:
Successful exploitation of the vulnerabilities could lead to remote code execution, elevation of privilege or information disclosure on an affected system.
Recommendation:
Some manufacturers have fixed or have planned to fix the vulnerabilities in their Android systems. Users are recommended to consult the vendors to confirm the availability of patches. If patches are available, users should upgrade to the fixed versions or follow the recommendations provided by the vendors to mitigate the risk.
More Information:
- https://source.android.com/docs/security/bulletin/2024-02-01
- https://www.hkcert.org/security-bulletin/android-multiple-vulnerabilities_20240207
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5091
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5249
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5643
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-32841 (to CVE-2023-32843)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-33046
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-33049
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-33057 (to CVE-2023-33058)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-33060
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-33072
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-33076
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40093
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-40122
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43513
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43516
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43518 (to CVE-2023-43520)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43522 (to CVE-2023-43523)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43533 (to CVE-2023-43534)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43536
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49667 (to CVE-2023-49668)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0014
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0029 (to CVE-2024-0038)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0040 (to CVE-2024-0041)
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20003
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20006
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20007
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-20009 (to CVE-2024-20011)