First published: Tue Jan 03 2023(Updated: )
In disp, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06535964; Issue ID: ALPS06535964.
Credit: security@mediatek.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google Android | =11.0 | |
Google Android | =12.0 | |
Mediatek Mt6735 | ||
Mediatek Mt6737 | ||
Mediatek Mt6739 | ||
Mediatek Mt6753 | ||
Mediatek Mt6757 | ||
Mediatek Mt6761 | ||
Mediatek Mt6763 | ||
Mediatek Mt6765 | ||
Mediatek Mt6768 | ||
Mediatek Mt6771 | ||
Mediatek Mt6779 | ||
Mediatek Mt6785 | ||
Mediatek Mt6789 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2022-32648.
The severity of CVE-2022-32648 is medium with a CVSS score of 6.4.
Google Android versions 11.0 and 12.0 are affected by CVE-2022-32648.
No, Mediatek Mt6735 is not vulnerable to CVE-2022-32648.
To patch CVE-2022-32648, please refer to the patch ID ALPS06535964 provided by MediaTek.