SB2022070825 - Multiple vulnerabilities in Google Android



SB2022070825 - Multiple vulnerabilities in Google Android

Published: July 8, 2022 Updated: October 8, 2025

Security Bulletin ID SB2022070825
Severity
High
Patch available
YES
Number of vulnerabilities 28
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 25% Medium 4% Low 71%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 28 secuirty vulnerabilities.


1) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-20236)

The vulnerability allows a malicious application to escalate privileges on the system.

The vulnerability exists due to improperly imposed security restrictions in Unisoc gpu component. A local application can execute arbitrary code with elevated privileges.


2) Buffer overflow (CVE-ID: CVE-2022-25659)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error when processing video files. A remote attacker can create a specially crafted video file, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


3) Untrusted Pointer Dereference (CVE-ID: CVE-2022-25658)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error when processing video files. A remote attacker can create a specially crafted video file, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


4) Buffer overflow (CVE-ID: CVE-2022-25657)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error when processing .mkv files. A remote attacker can create a specially crafted video file, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


5) Use-after-free (CVE-ID: CVE-2022-22058)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to a use-after-free error in kernel while processing ION handles. A local application can trigger a use-after-free error and execute arbitrary code with elevated privileges.


6) Stack-based buffer overflow (CVE-ID: CVE-2022-22096)

The vulnerability allows an attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error in Bluetooth HOST. An attacker with physical proximity to device can send specially crafted data to trigger stack-based buffer overflow and execute arbitrary code on the target system.



7) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-20238)

The vulnerability allows a malicious application to escalate privileges on the system.

The vulnerability exists due to improperly imposed security restrictions in Unisoc kernel component. A local application can execute arbitrary code with elevated privileges.


8) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-20217)

The vulnerability allows a malicious application to escalate privileges on the system.

The vulnerability exists due to improperly imposed security restrictions in Unisoc Telephony component. A local application can execute arbitrary code with elevated privileges.


9) Out-of-bounds read (CVE-ID: CVE-2022-20227)

The vulnerability allows a local application to gain access to potentially sensitive information.

The vulnerability exists due to a boundary condition in USB implementation in OS kernel. A malicious application can read potentially sensitive information from kernel memory.


10) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-20216)

The vulnerability allows a malicious application to escalate privileges on the system.

The vulnerability exists due to improperly imposed security restrictions in Unisoc Telephony component. A local application can execute arbitrary code with elevated privileges.


11) Improper access control (CVE-ID: CVE-2022-21764)

The vulnerability allows a local application to gain access to sensitive information.

The vulnerability exists due to improper access restrictions in telecom service. A local application can obtain potentially sensitive information.

12) Improper access control (CVE-ID: CVE-2022-21763)

The vulnerability allows a local application to gain access to sensitive information.

The vulnerability exists due to improper access restrictions in telecom service. A local application can obtain potentially sensitive information.


13) Heap-based buffer overflow (CVE-ID: CVE-2022-21768)

The vulnerability allows an attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error within Bluetooth implementation. A remote attacker with physical proximity to device can trigger a heap-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


14) Heap-based buffer overflow (CVE-ID: CVE-2022-21767)

The vulnerability allows an attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error within Bluetooth implementation. A remote attacker with physical proximity to device can trigger a heap-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


15) Out-of-bounds write (CVE-ID: CVE-2022-21744)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a boundary error when processing untrusted input in Modem 2G RR when decoding GPRS Packet Neighbour Cell Data (PNCD). A remote attacker can send specially crafted packets to the device, trigger an out-of-bounds write and execute arbitrary code on the target system.


16) Out-of-bounds write (CVE-ID: CVE-2022-20083)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a boundary error in Modem 2G/3G CC when decoding combined FACILITY. A remote attacker can send specially crafted packets to the device, trigger an out-of-bounds write and execute arbitrary code on the target system.


17) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-20220)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to Android Framework does not properly impose security restrictions and allows file operations outside the Call Composer directory. A local application can execute arbitrary code with elevated privileges.


18) Information disclosure (CVE-ID: CVE-2022-20219)

The vulnerability allows a local application to gain access to potentially sensitive information.

The vulnerability exists due to unspecified error in Android Framework. A local application can gain unauthorized access to sensitive information on the system.


19) Information disclosure (CVE-ID: CVE-2022-20228)

The vulnerability allows a local application to gain access to potentially sensitive information.

The vulnerability exists due to unspecified error in Android Framework. A local application can gain unauthorized access to sensitive information on the system.


20) Input validation error (CVE-ID: CVE-2022-20222)

The vulnerability allows a remote attacker to execute arbitrary code on the system.

The vulnerability exists due to an unspecified error in Android System. A remote attacker can trick the victim into opening a specially crafted input and execute arbitrary code on the system.


21) Input validation error (CVE-ID: CVE-2022-20229)

The vulnerability allows a remote attacker to execute arbitrary code on the system.

The vulnerability exists due to an unspecified error in Android System. A remote attacker can trick the victim into opening a specially crafted input and execute arbitrary code on the system.


22) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2021-0981)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to unspecified error in Android System. A local application can trigger the vulnerability and escalate privileges on the system.


23) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-20223)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to unspecified error in Android System. A local application can trigger the vulnerability and escalate privileges on the system.


24) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2022-20226)

The vulnerability allows a local application to escalate privileges on the system.

The vulnerability exists due to unspecified error in Android System. A local application can trigger the vulnerability and escalate privileges on the system.


25) Information disclosure (CVE-ID: CVE-2022-20221)

The vulnerability allows a local application to gain access to potentially sensitive information.

The vulnerability exists due to unspecified error in Android System. A local application can gain unauthorized access to sensitive information on the system.


26) Information disclosure (CVE-ID: CVE-2022-20224)

The vulnerability allows a local application to gain access to potentially sensitive information.

The vulnerability exists due to unspecified error in Android System. A local application can gain unauthorized access to sensitive information on the system.


27) Information disclosure (CVE-ID: CVE-2022-20225)

The vulnerability allows a local application to gain access to potentially sensitive information.

The vulnerability exists due to unspecified error in Android System. A local application can gain unauthorized access to sensitive information on the system.


28) Information disclosure (CVE-ID: CVE-2022-20230)

The vulnerability allows a local application to gain access to potentially sensitive information.

The vulnerability exists due to unspecified error in Android System. A local application can gain unauthorized access to sensitive information on the system.


Remediation

Install update from vendor's website.