First published: Tue Jun 06 2023(Updated: )
In vcu, there is a possible use after free due to a logic error. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07519142; Issue ID: ALPS07519200.
Credit: security@mediatek.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linuxfoundation Iot-yocto | =22.2 | |
Linuxfoundation Yocto | =4.0 | |
Google Android | =12.0 | |
Google Android | =13.0 | |
Mediatek Mt6789 | ||
Mediatek Mt6855 | ||
Mediatek Mt8185 | ||
Mediatek Mt8195 | ||
Mediatek Mt8365 | ||
Mediatek Mt8395 | ||
Mediatek Mt8781 | ||
Mediatek Mt8786 | ||
Mediatek Mt8789 | ||
Mediatek Mt8791 | ||
Mediatek Mt8797 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-20744 is a vulnerability in vcu that allows for a use after free due to a logic error, potentially leading to local escalation of privilege.
The severity of CVE-2023-20744 is medium with a CVSS score of 6.7.
CVE-2023-20744 affects Linuxfoundation IOT-Yocto 22.2, Linuxfoundation Yocto 4.0, Google Android 12.0, and Google Android 13.0.
The patch ID for CVE-2023-20744 is ALPS07519142 and the issue ID is ALPS07519200.
No, Mediatek Mt6789 is not vulnerable to CVE-2023-20744.