First published: Tue Jun 06 2023(Updated: )
In vcu, there is a possible out of bounds write due to improper locking. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07519142; Issue ID: ALPS07560694.
Credit: security@mediatek.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linuxfoundation Iot-yocto | =22.2 | |
Linuxfoundation Yocto | =4.0 | |
Google Android | =12.0 | |
Google Android | =13.0 | |
Mediatek Mt6789 | ||
Mediatek Mt6855 | ||
Mediatek Mt8185 | ||
Mediatek Mt8195 | ||
Mediatek Mt8365 | ||
Mediatek Mt8395 | ||
Mediatek Mt8781 | ||
Mediatek Mt8786 | ||
Mediatek Mt8789 | ||
Mediatek Mt8791 | ||
Mediatek Mt8797 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-20745 is medium with a CVSS score of 6.7.
CVE-2023-20745 affects Linuxfoundation Yocto 22.2, Linuxfoundation Yocto 4.0, Google Android 12.0, and Google Android 13.0.
CVE-2023-20745 can be exploited without user interaction.
Yes, a patch with the ID ALPS07519142 is available for CVE-2023-20745.
You can find more information about CVE-2023-20745 on the MediaTek Product Security Bulletin website.