First published: Tue Jun 06 2023(Updated: )
In vcu, there is a possible use after free due to improper locking. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07645149; Issue ID: ALPS07645149.
Credit: security@mediatek.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linuxfoundation Iot-yocto | =22.2 | |
Linuxfoundation Yocto | =4.0 | |
Google Android | =12.0 | |
Google Android | =13.0 | |
Mediatek Mt6768 | ||
Mediatek Mt6769 | ||
Mediatek Mt6779 | ||
Mediatek Mt6781 | ||
Mediatek Mt6785 | ||
Mediatek Mt6789 | ||
Mediatek Mt6833 | ||
Mediatek Mt6853 | ||
Mediatek Mt6853t | ||
Mediatek Mt6873 | ||
Mediatek Mt6875 | ||
Mediatek Mt6877 | ||
Mediatek Mt6883 | ||
Mediatek Mt6885 | ||
Mediatek Mt6889 | ||
Mediatek Mt6891 | ||
Mediatek Mt6893 | ||
Mediatek Mt8168 | ||
Mediatek Mt8365 | ||
Mediatek Mt8395 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-20733 is a vulnerability in vcu that allows for a use after free due to improper locking, leading to potential escalation of privilege.
CVE-2023-20733 has a severity value of 6.7, which is considered medium severity.
CVE-2023-20733 affects Linuxfoundation Iot-yocto 22.2, Linuxfoundation Yocto 4.0, Google Android 12.0, and Google Android 13.0.
No, user interaction is not needed for exploitation of CVE-2023-20733.
To fix CVE-2023-20733, apply the patch ID ALPS07645149 or update the affected software with the provided fixes.