{"id":951,"date":"2023-06-18T08:16:12","date_gmt":"2023-06-18T08:16:12","guid":{"rendered":"https:\/\/cybersecuritynest.com\/?p=951"},"modified":"2023-06-18T08:16:12","modified_gmt":"2023-06-18T08:16:12","slug":"a-security-update-for-android-addresses-a-mali-gpu-flaw-that-can-be-used-as-a-zero-day","status":"publish","type":"post","link":"https:\/\/cybersecuritynest.com\/?p=951","title":{"rendered":"A security update for Android addresses a Mali GPU flaw that can be used as a zero-day"},"content":{"rendered":"<aside class=\"mashsb-container mashsb-main mashsb-stretched\"><div class=\"mashsb-box\"><div class=\"mashsb-buttons\"><a class=\"mashicon-facebook mash-large mash-center mashsb-noshadow\" href=\"https:\/\/www.facebook.com\/sharer.php?u=https%3A%2F%2Fcybersecuritynest.com%2F%3Fp%3D951\" target=\"_top\" rel=\"nofollow\"><span class=\"icon\"><\/span><span class=\"text\">Share&nbsp;on&nbsp;Facebook<\/span><\/a><a class=\"mashicon-twitter mash-large mash-center mashsb-noshadow\" href=\"https:\/\/twitter.com\/intent\/tweet?text=&amp;url=https:\/\/cybersecuritynest.com\/?p=951&amp;via=CYBERSECNEST\" target=\"_top\" rel=\"nofollow\"><span class=\"icon\"><\/span><span class=\"text\">Tweet&nbsp;on&nbsp;Twitter<\/span><\/a><a class=\"mashicon-subscribe mash-large mash-center mashsb-noshadow\" href=\"#\" target=\"_top\" rel=\"nofollow\"><span class=\"icon\"><\/span><span class=\"text\">Subscribe&nbsp;to&nbsp;Newsletter<\/span><\/a><div class=\"onoffswitch2 mash-large mashsb-noshadow\" style=\"display:none\"><\/div><\/div>\n            <\/div>\n                <div style=\"clear:both\"><\/div><\/aside>\n            <!-- Share buttons by mashshare.net - Version: 4.0.47--><p>The Android platform&#8217;s monthly security update from Google includes fixes for 56 vulnerabilities, five of which have a critical severity rating and one that has been exploited since at least December of last year.<\/p>\n<p>A patch for CVE-2022-22706, a high-severity flaw in the Mali GPU kernel driver from Arm that Google&#8217;s Threat Analysis Group (TAG) believes may have been used in a spyware campaign targeting Samsung phones, is included in the new security patch level 2023-06-05.<\/p>\n<p>According to Google&#8217;s most recent bulletin, &#8220;There are indications that CVE-2022-22706 may be under limited, targeted exploitation.&#8221; In a March advisory, CISA also highlighted the active exploitation of CVE-2022-22706.<\/p>\n<p>The high-severity security flaw grants non-privileged users write access to read-only memory pages, earning it a score of 7.8 out of 10.<\/p>\n<p>Arm claims that the problem affects the following kernel driver versions:<\/p>\n<p>Driver for Midgard GPU Kernel: From r26p0 to r31p0<br \/>\nBifrost GPU Kernel Driver: From r0p0 to r35p0,<br \/>\nValhall GPU Kernel Driver is available. Arm fixed the problem in Bifrost and Valhall GPU Kernel Driver r36p0<br \/>\nMidgard Kernel Driver r32p0 (all versions from r19p0 to r35p0), but the fix is only now in the stable version of Android.<\/p>\n<p>It is important to note that Samsung fixed CVE-2022-22706 in its update for May 2023. The fact that the spyware campaign explicitly targeted the company&#8217;s customers is likely the reason for the company&#8217;s swift response to the active exploitation of the flaw.<\/p>\n<p>The following are the critical-severity flaws fixed in the Android update this month:<\/p>\n<p>CVE-2023-21127 \u2013 Remote code execution flaw in Android Framework, impacting Android 11, 12, and 13. Fixed in security patch level \u201c2023-06-01.\u201d<br \/>\nCVE-2023-21108 \u2013 Remote code execution flaw in Android System, impacting Android 11, 12, and 13. Fixed in security patch level \u201c2023-06-01.\u201d<br \/>\nCVE-2023-21130 \u2013 Remote code execution flaw in Android System, impacting Android 13. Fixed in security patch level \u201c2023-06-01.\u201d<br \/>\nCVE-2022-33257 \u2013 Critical flaw of an undefined type, impacting Qualcomm closed-source components. Fixed in security patch level \u201c2023-06-05.\u201d<br \/>\nCVE-2022-40529 \u2013 Critical flaw of an undefined type, impacting Qualcomm closed-source components. Fixed in security patch level \u201c2023-06-05.\u201d<\/p>\n<p>This security update is not available for devices running Android 10 or later because they are no longer supported.<\/p>\n<p>Users of out-of-date devices ought to be aware of the possibility of an impact. They should either upgrade to a more recent Android model that is actively supported or use a third-party Android distribution that still provides security updates, despite the fact that these typically take some time to arrive.<\/p>\n<aside class=\"mashsb-container mashsb-main mashsb-stretched\"><div class=\"mashsb-box\"><div class=\"mashsb-buttons\"><a class=\"mashicon-facebook mash-large mash-center mashsb-noshadow\" href=\"https:\/\/www.facebook.com\/sharer.php?u=https%3A%2F%2Fcybersecuritynest.com%2F%3Fp%3D951\" target=\"_top\" rel=\"nofollow\"><span class=\"icon\"><\/span><span class=\"text\">Share&nbsp;on&nbsp;Facebook<\/span><\/a><a class=\"mashicon-twitter mash-large mash-center mashsb-noshadow\" href=\"https:\/\/twitter.com\/intent\/tweet?text=&amp;url=https:\/\/cybersecuritynest.com\/?p=951&amp;via=CYBERSECNEST\" target=\"_top\" rel=\"nofollow\"><span class=\"icon\"><\/span><span class=\"text\">Tweet&nbsp;on&nbsp;Twitter<\/span><\/a><a class=\"mashicon-subscribe mash-large mash-center mashsb-noshadow\" href=\"#\" target=\"_top\" rel=\"nofollow\"><span class=\"icon\"><\/span><span class=\"text\">Subscribe&nbsp;to&nbsp;Newsletter<\/span><\/a><div class=\"onoffswitch2 mash-large mashsb-noshadow\" style=\"display:none\"><\/div><\/div>\n            <\/div>\n                <div style=\"clear:both\"><\/div><\/aside>\n            <!-- Share buttons by mashshare.net - Version: 4.0.47-->","protected":false},"excerpt":{"rendered":"<p>The Android platform&#8217;s monthly security update from Google includes fixes for 56 vulnerabilities, five of which have a critical severity rating and one that has been exploited since at least December of last year. A patch for CVE-2022-22706, a high-severity flaw in the Mali GPU kernel driver from Arm that Google&#8217;s Threat Analysis Group (TAG) [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":952,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":"","_links_to":"","_links_to_target":""},"categories":[13],"tags":[],"class_list":["post-951","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mobile"],"aioseo_notices":[],"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/cybersecuritynest.com\/index.php?rest_route=\/wp\/v2\/posts\/951"}],"collection":[{"href":"https:\/\/cybersecuritynest.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersecuritynest.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cybersecuritynest.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecuritynest.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=951"}],"version-history":[{"count":1,"href":"https:\/\/cybersecuritynest.com\/index.php?rest_route=\/wp\/v2\/posts\/951\/revisions"}],"predecessor-version":[{"id":953,"href":"https:\/\/cybersecuritynest.com\/index.php?rest_route=\/wp\/v2\/posts\/951\/revisions\/953"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybersecuritynest.com\/index.php?rest_route=\/wp\/v2\/media\/952"}],"wp:attachment":[{"href":"https:\/\/cybersecuritynest.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=951"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersecuritynest.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=951"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersecuritynest.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=951"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}