Vulnerability
CVE-2022-33226
Component: DEBUG
Location: OS
Memory corruption due to buffer copy without checking the size of input in Core while processing ioctl commands from diag client applications.
Impact
Severity (Manufact.)
MEDIUM
Severity (NIST)
7.8
Severity (Android)
N/A
Chipsets
5
Devices
426
Affected Hardware
Information reliability
The information on this website is intended to provide information on the big picture of chipset security and measure trends within the industry. Our information is obtained from several vantage points, checked for consistency, and automatically cross-referenced. However, this process may not always yield reliable information. Do not use the information on a particular vulnerability, chipset or device to verify your individual exposure in cases where inaccuracies are inacceptable, for instance to assess risks if you are a Politically Exposed Person.
Timeline
Introduced (est):
Jan 1, 2019
Reported:
Jul 12, 2022
Advisory Published:
Jun 5, 2023
CVE Published:
Jun 6, 2023
Android Patch Level:
None