First published: Tue Jun 06 2023(Updated: )
In vcu, there is a possible out of bounds write due to improper locking. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07519142; Issue ID: ALPS07560694.
Credit: security@mediatek.com security@mediatek.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Any of | ||
Yocto Project | =22.2 | |
Yocto Project | =4.0 | |
Android | =12.0 | |
Android | =13.0 | |
Any of | ||
MediaTek M6789 | ||
MediaTek MT6855 | ||
MediaTek MT8185 | ||
MediaTek MT8195Z | ||
MediaTek MT8365 Firmware | ||
MediaTek MT8395 | ||
MediaTek MT8781 WiFi | ||
MediaTek MT8786 | ||
MediaTek MT8789 | ||
MediaTek MT8791 WiFi | ||
MediaTek MT8797 WiFi | ||
Yocto Project | =22.2 | |
Yocto Project | =4.0 | |
Android | =12.0 | |
Android | =13.0 | |
MediaTek M6789 | ||
MediaTek MT6855 | ||
MediaTek MT8185 | ||
MediaTek MT8195Z | ||
MediaTek MT8365 Firmware | ||
MediaTek MT8395 | ||
MediaTek MT8781 WiFi | ||
MediaTek MT8786 | ||
MediaTek MT8789 | ||
MediaTek MT8791 WiFi | ||
MediaTek MT8797 WiFi |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-20745 is medium with a CVSS score of 6.7.
CVE-2023-20745 affects Linuxfoundation Yocto 22.2, Linuxfoundation Yocto 4.0, Google Android 12.0, and Google Android 13.0.
CVE-2023-20745 can be exploited without user interaction.
Yes, a patch with the ID ALPS07519142 is available for CVE-2023-20745.
You can find more information about CVE-2023-20745 on the MediaTek Product Security Bulletin website.