SB2022061414 - Multiple vulnerabilities in Google Pixel



SB2022061414 - Multiple vulnerabilities in Google Pixel

Published: June 14, 2022 Updated: December 13, 2024

Security Bulletin ID SB2022061414
Severity
Medium
Patch available
YES
Number of vulnerabilities 78
Exploitation vector Adjecent network
Highest impact Code execution

Breakdown by Severity

Medium 6% Low 94%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 78 secuirty vulnerabilities.


1) Information disclosure (CVE-ID: CVE-2022-20190)

The vulnerability allows a local application to gain access to potentially sensitive information.

The vulnerability exists due to excessive data output by the Modem. A local application can gain unauthorized access to sensitive information on the system.


2) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-20183)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to an unspecified error in the kernel. A local application can bypass security restrictions and escalate privileges on the system.


3) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-20178)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to an unspecified error in the Camera. A local application can bypass security restrictions and escalate privileges on the system.


4) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-20155)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to an unspecified error in the Kernel. A local application can bypass security restrictions and escalate privileges on the system.


5) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-20152)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to an unspecified error in the TitanM. A local application can bypass security restrictions and escalate privileges on the system.


6) Improper Privilege Management (CVE-ID: CVE-2021-39653)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a missing warning to the user. A local user can trigger the vulnerability to escalate privileges on the system.


7) Input validation error (CVE-ID: CVE-2022-20181)

The vulnerability allows a malicious application to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input in the Modem. A malicious application can trick the victim to perform certain actions and crash the system.


8) Input validation error (CVE-ID: CVE-2022-20168)

The vulnerability allows a malicious application to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input in the Modem. A malicious application can trick the victim to perform certain actions and crash the system.


9) Information disclosure (CVE-ID: CVE-2022-20177)

The vulnerability allows a local application to gain access to potentially sensitive information.

The vulnerability exists due to excessive data output by the Modem. A local application can gain unauthorized access to sensitive information on the system.


10) Information disclosure (CVE-ID: CVE-2022-20146)

The vulnerability allows a local application to gain access to potentially sensitive information.

The vulnerability exists due to excessive data output by the Telephony. A local application can gain unauthorized access to sensitive information on the system.


11) Information disclosure (CVE-ID: CVE-2022-20165)

The vulnerability allows a local application to gain access to potentially sensitive information.

The vulnerability exists due to excessive data output by the Titan-M. A local application can gain unauthorized access to sensitive information on the system.


12) Information disclosure (CVE-ID: CVE-2022-20162)

The vulnerability allows a local application to gain access to potentially sensitive information.

The vulnerability exists due to excessive data output by the Titan-M. A local application can gain unauthorized access to sensitive information on the system.


13) Information disclosure (CVE-ID: CVE-2022-20159)

The vulnerability allows a local application to gain access to potentially sensitive information.

The vulnerability exists due to excessive data output by the Titan-M. A local application can gain unauthorized access to sensitive information on the system.


14) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-20186)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to an unspecified error in the Display/graphics. A local application can bypass security restrictions and escalate privileges on the system.


15) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-20167)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to an unspecified error in the Modem. A local application can bypass security restrictions and escalate privileges on the system.


16) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-20164)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to an unspecified error in the Modem. A local application can bypass security restrictions and escalate privileges on the system.


17) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-20156)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to an unspecified error in the Display/graphics. A local application can bypass security restrictions and escalate privileges on the system.


18) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-20185)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to an unspecified error in the Kernel. A local application can bypass security restrictions and escalate privileges on the system.


19) Information disclosure (CVE-ID: CVE-2022-20149)

The vulnerability allows a local application to gain access to potentially sensitive information.

The vulnerability exists due to excessive data output by the Modem. A local application can gain unauthorized access to sensitive information on the system.


20) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-20233)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to an unspecified error in the Titan-M. A local application can bypass security restrictions and escalate privileges on the system.


21) Information disclosure (CVE-ID: CVE-2022-20188)

The vulnerability allows a local application to gain access to potentially sensitive information.

The vulnerability exists due to excessive data output by the Modem. A local application can gain unauthorized access to sensitive information on the system.


22) Out-of-bounds read (CVE-ID: CVE-2020-27068)

The vulnerability allows a local application to gain access to potentially sensitive information.

The vulnerability exists due to excessive data output by the Kernel. A local application can gain unauthorized access to sensitive information on the system.


23) Integer overflow (CVE-ID: CVE-2022-0185)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to integer overflow in the legacy_parse_param() function in fs/fs_context.c in Linux kernel. A local user can tun a specially crafted program to trigger integer overflow and execute arbitrary code with root privileges.



24) Use-after-free (CVE-ID: CVE-2021-33034)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error in net/bluetooth/hci_event.c when destroying an hci_chan. A local user can escalate privileges on the system.



25) Improper Validation of Array Index (CVE-ID: CVE-2021-35121)

The vulnerability allows a local attacker to compromise vulnerable system.

The vulnerability exists due to a improper validation of array index in MM Framework. A local administrator can trigger use-after-free condition in the Synx driver and execute arbitrary code on the target system.


26) Double Free (CVE-ID: CVE-2021-35120)

The vulnerability allows a local user to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in MM Frameworks. A local administrator can pass specially crafted data to the application, trigger double free error and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


27) Out-of-bounds read (CVE-ID: CVE-2021-35119)

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary condition in FIPS event processing. A local user can trigger out-of-bounds read error and cause a denial of service condition on the system.


28) Use of Out-of-range Pointer Offset (CVE-ID: CVE-2021-35118)

The vulnerability allows a local user to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in the camera driver. A local administrator can trigger memory corruption and execute arbitrary code on the target system.


29) Information disclosure (CVE-ID: CVE-2022-20184)

The vulnerability allows a local application to gain access to potentially sensitive information.

The vulnerability exists due to excessive data output by the Modem. A local application can gain unauthorized access to sensitive information on the system.


30) Information disclosure (CVE-ID: CVE-2022-20151)

The vulnerability allows a local application to gain access to potentially sensitive information.

The vulnerability exists due to excessive data output by the Modem. A local application can gain unauthorized access to sensitive information on the system.


31) Information disclosure (CVE-ID: CVE-2022-20182)

The vulnerability allows a local application to gain access to potentially sensitive information.

The vulnerability exists due to excessive data output by the Bootloader. A local application can gain unauthorized access to sensitive information on the system.


32) Information disclosure (CVE-ID: CVE-2022-20179)

The vulnerability allows a local application to gain access to potentially sensitive information.

The vulnerability exists due to excessive data output by the Modem. A local application can gain unauthorized access to sensitive information on the system.


33) Information disclosure (CVE-ID: CVE-2022-20176)

The vulnerability allows a local application to gain access to potentially sensitive information.

The vulnerability exists due to excessive data output by the Modem. A local application can gain unauthorized access to sensitive information on the system.


34) Information disclosure (CVE-ID: CVE-2022-20175)

The vulnerability allows a local application to gain access to potentially sensitive information.

The vulnerability exists due to excessive data output by the Modem. A local application can gain unauthorized access to sensitive information on the system.


35) Information disclosure (CVE-ID: CVE-2022-20174)

The vulnerability allows a local application to gain access to potentially sensitive information.

The vulnerability exists due to excessive data output by the Bootloader. A local application can gain unauthorized access to sensitive information on the system.


36) Information disclosure (CVE-ID: CVE-2022-20172)

The vulnerability allows a local application to gain access to potentially sensitive information.

The vulnerability exists due to excessive data output by the Telephony. A local application can gain unauthorized access to sensitive information on the system.


37) Information disclosure (CVE-ID: CVE-2022-20169)

The vulnerability allows a local application to gain access to potentially sensitive information.

The vulnerability exists due to excessive data output by the Modem. A local application can gain unauthorized access to sensitive information on the system.


38) Input validation error (CVE-ID: CVE-2022-20173)

The vulnerability allows a remote attacker on the local network to execute arbitrary code.

The vulnerability exists due to insufficient validation of user-supplied input. A remote attacker on the local network can execute arbitrary code on the system.


39) Input validation error (CVE-ID: CVE-2022-20191)

The vulnerability allows a remote attacker on the local network to execute arbitrary code.

The vulnerability exists due to insufficient validation of user-supplied input. A remote attacker on the local network can execute arbitrary code on the system.


40) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2021-39806)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to an unspecified error in the Framework. A local application can bypass security restrictions and escalate privileges on the system.


41) Information disclosure (CVE-ID: CVE-2022-20209)

The vulnerability allows a local application to gain access to potentially sensitive information.

The vulnerability exists due to excessive data output by the Media Framework. A local application can gain unauthorized access to sensitive information on the system.


42) Information disclosure (CVE-ID: CVE-2022-20206)

The vulnerability allows a local application to gain access to potentially sensitive information.

The vulnerability exists due to excessive data output by the System. A local application can gain unauthorized access to sensitive information on the system.


43) Information disclosure (CVE-ID: CVE-2022-20205)

The vulnerability allows a local application to gain access to potentially sensitive information.

The vulnerability exists due to excessive data output by the System. A local application can gain unauthorized access to sensitive information on the system.


44) Information disclosure (CVE-ID: CVE-2022-20200)

The vulnerability allows a local application to gain access to potentially sensitive information.

The vulnerability exists due to excessive data output by the System. A local application can gain unauthorized access to sensitive information on the system.


45) Information disclosure (CVE-ID: CVE-2022-20198)

The vulnerability allows a local application to gain access to potentially sensitive information.

The vulnerability exists due to excessive data output by the System. A local application can gain unauthorized access to sensitive information on the system.


46) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-20207)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to an unspecified error in the System. A local application can bypass security restrictions and escalate privileges on the system.


47) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-20194)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to an unspecified error in the System. A local application can bypass security restrictions and escalate privileges on the system.


48) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-20139)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to an unspecified error in the System. A local application can bypass security restrictions and escalate privileges on the system.


49) Information disclosure (CVE-ID: CVE-2022-20202)

The vulnerability allows a local application to gain access to potentially sensitive information.

The vulnerability exists due to excessive data output by the Media Framework. A local application can gain unauthorized access to sensitive information on the system.


50) Input validation error (CVE-ID: CVE-2022-20195)

The vulnerability allows a malicious application to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input in the System. A malicious application can trick the victim to perform certain actions and crash the system.


51) Information disclosure (CVE-ID: CVE-2022-20196)

The vulnerability allows a local application to gain access to potentially sensitive information.

The vulnerability exists due to excessive data output by the Framework. A local application can gain unauthorized access to sensitive information on the system.


52) Information disclosure (CVE-ID: CVE-2021-0983)

The vulnerability allows a local application to gain access to potentially sensitive information.

The vulnerability exists due to excessive data output by the Framework. A local application can gain unauthorized access to sensitive information on the system.


53) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-20204)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to an unspecified error in the Framework. A local application can bypass security restrictions and escalate privileges on the system.


54) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-20201)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to an unspecified error in the Framework. A local application can bypass security restrictions and escalate privileges on the system.


55) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-20197)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to an unspecified error in the Framework. A local application can bypass security restrictions and escalate privileges on the system.


56) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-20193)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to an unspecified error in the Framework. A local application can bypass security restrictions and escalate privileges on the system.


57) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-20192)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to an unspecified error in the Framework. A local application can bypass security restrictions and escalate privileges on the system.


58) Information disclosure (CVE-ID: CVE-2022-20208)

The vulnerability allows a local application to gain access to potentially sensitive information.

The vulnerability exists due to excessive data output by the System. A local application can gain unauthorized access to sensitive information on the system.


59) Buffer overflow (CVE-ID: CVE-2018-25020)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a boundary error within the BPF subsystem in the Linux kernel in ernel/bpf/core.c and net/core/filter.c. The kernel mishandles situations with a long jump over an instruction sequence where inner instructions require substantial expansions into multiple BPF instructions. A local user can run a specially crafted program to trigger memory corruption and execute arbitrary code with elevated privileges.


60) Input validation error (CVE-ID: CVE-2022-20171)

The vulnerability allows a remote attacker on the local network to execute arbitrary code.

The vulnerability exists due to insufficient validation of user-supplied input. A remote attacker on the local network can execute arbitrary code on the system.


61) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-20154)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to unspecified error in the Linux Kernel. A local user can bypass security restrictions and escalate privileges on the system.


62) Input validation error (CVE-ID: CVE-2022-20170)

The vulnerability allows a remote attacker on the local network to execute arbitrary code.

The vulnerability exists due to insufficient validation of user-supplied input. A remote attacker on the local network can execute arbitrary code on the system.


63) Input validation error (CVE-ID: CVE-2022-20160)

The vulnerability allows a remote attacker on the local network to execute arbitrary code.

The vulnerability exists due to insufficient validation of user-supplied input. A remote attacker on the local network can execute arbitrary code on the system.


64) Use-after-free (CVE-ID: CVE-2022-26966)

The vulnerability allows a remote attacker to gain access to sensitive information.

The vulnerability exists due to a use-after-free error in drivers/net/usb/sr9700.c in the Linux kernel. A remote attacker can pass specially crafted data and obtain sensitive information from heap memory.


65) Out-of-bounds read (CVE-ID: CVE-2021-3753)

The vulnerability allows a local user to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition in the vt_k_ioctl in drivers/tty/vt/vt_ioctl.c in the Linux kernel. A local user can trigger out-of-bounds read error and read contents of memory on the system.


66) Out-of-bounds read (CVE-ID: CVE-2021-3743)

The vulnerability allows a local user to perform a denial of service attack.

The vulnerability exists due to a boundary condition in the Qualcomm IPC router protocol in the Linux kernel. A local user can gain access to out-of-bounds memory to leak internal kernel information or perform a denial of service attack.


67) Security restrictions bypass (CVE-ID: CVE-2022-23222)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to availability of pointer arithmetic via certain *_OR_NULL pointer types in kernel/bpf/verifier.c in the Linux kernel. A local user can run a specially crafted program to execute arbitrary code with root privileges.


68) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-20166)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to unspecified error in the Linux Kernel. A local user can bypass security restrictions and escalate privileges on the system.


69) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-20153)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to unspecified error in the Linux Kernel. A local user can bypass security restrictions and escalate privileges on the system.


70) Buffer overflow (CVE-ID: CVE-2021-3635)

The vulnerability allows a local user to perform a denial of service attack.

The vulnerability exists due to a boundary error in the Linux kernel netfilter implementation. A local user with root (CAP_SYS_ADMIN) access can panic the system when issuing netfilter netflow commands.


71) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-20148)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to unspecified error in the Linux Kernel. A local user can bypass security restrictions and escalate privileges on the system.


72) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-0492)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a logic error within the cgroup_release_agent_write() function in  kernel/cgroup/cgroup-v1.c. A local user can use the cgroups v1 release_agent feature to escalate privileges and bypass the namespace isolation.


73) Use-after-free (CVE-ID: CVE-2021-44733)

The vulnerability allows a local user to elevate privileges on the system.

The vulnerability exists due to a use-after-free error in the drivers/tee/tee_shm.c file within the TEE subsystem in the Linux kernel. A local user can trigger a race condition in tee_shm_get_from_id during an attempt to free a shared memory object and execute arbitrary code with elevated privileges.


74) Information disclosure (CVE-ID: CVE-2021-34556)

The vulnerability allows a local user to gain access to potentially sensitive information.

The vulnerability exists due to excessive data output by the application. A local user can gain unauthorized access to sensitive information on the system.


75) Incorrect calculation (CVE-ID: CVE-2021-31440)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to out-of-bounds access flaw in the Linux kernel’s implementation of the eBPF code verifier, where an incorrect register bounds calculation while checking unsigned 32-bit instructions in an eBPF program occurs. A local user can use this flaw to crash the system or possibly escalate their privileges on the system.


76) Race condition (CVE-ID: CVE-2021-20321)

The vulnerability allows a local user to perform a denial of service (DoS) attacks.

The vulnerability exists due to a race condition when accessing file object in the Linux kernel OverlayFS subsystem. A local user can rename files in specific way with OverlayFS and perform a denial of service (DoS) attack.


77) Input validation error (CVE-ID: CVE-2021-20268)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists in the Linux kernel's implementation of the eBPF code verifier in the way a user running the eBPF script calls dev_map_init_map or sock_map_alloc. A local user can crash the system or escalate privileges on the system.


78) Use-after-free (CVE-ID: CVE-2021-3715)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error in the "Routing decision" classifier in the Linux kernel's Traffic Control networking subsystem (route4_change() function in net/sched/cls_route.c) in the way it handled changing of classification filters. A local user can trigger a use-after-free error and execute arbitrary code with elevated privileges.



Remediation

Install update from vendor's website.