First published: Tue Jun 06 2023(Updated: )
In vcu, there is a possible out of bounds write due to improper locking. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07519142; Issue ID: ALPS07519142.
Credit: security@mediatek.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linuxfoundation Iot-yocto | =22.2 | |
Linuxfoundation Yocto | =4.0 | |
Google Android | =12.0 | |
Google Android | =13.0 | |
Mediatek Mt6789 | ||
Mediatek Mt6855 | ||
Mediatek Mt8185 | ||
Mediatek Mt8195 | ||
Mediatek Mt8365 | ||
Mediatek Mt8395 | ||
Mediatek Mt8781 | ||
Mediatek Mt8786 | ||
Mediatek Mt8789 | ||
Mediatek Mt8791 | ||
Mediatek Mt8797 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-20743 is medium (6.7).
The affected software of CVE-2023-20743 includes Linuxfoundation IoT Yocto 22.2, Linuxfoundation Yocto 4.0, Google Android 12.0, and Google Android 13.0.
This vulnerability can be exploited without user interaction.
The patch ID for CVE-2023-20743 is ALPS07519142.
More information about CVE-2023-20743 can be found at the following reference: [https://corp.mediatek.com/product-security-bulletin/June-2023](https://corp.mediatek.com/product-security-bulletin/June-2023)