First published: Tue Jun 06 2023(Updated: )
In vcu, there is a possible out of bounds write due to improper locking. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07519142; Issue ID: ALPS07519217.
Credit: security@mediatek.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linuxfoundation Iot-yocto | =22.2 | |
Linuxfoundation Yocto | =4.0 | |
Google Android | =12.0 | |
Google Android | =13.0 | |
Mediatek Mt6789 | ||
Mediatek Mt6855 | ||
Mediatek Mt8167 | ||
Mediatek Mt8168 | ||
Mediatek Mt8173 | ||
Mediatek Mt8185 | ||
Mediatek Mt8195 | ||
Mediatek Mt8321 | ||
Mediatek Mt8365 | ||
Mediatek Mt8395 | ||
Mediatek Mt8765 | ||
Mediatek Mt8766 | ||
Mediatek Mt8768 | ||
Mediatek Mt8781 | ||
Mediatek Mt8786 | ||
Mediatek Mt8788 | ||
Mediatek Mt8789 | ||
Mediatek Mt8791 | ||
Mediatek Mt8791t | ||
Mediatek Mt8797 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this vulnerability is CVE-2023-20746.
The severity of CVE-2023-20746 is medium with a CVSS score of 6.7.
The affected software includes Linuxfoundation IoT Yocto 22.2, Linuxfoundation Yocto 4.0, Google Android 12.0, and Google Android 13.0.
No, user interaction is not needed for exploitation of CVE-2023-20746.
To fix CVE-2023-20746, apply the provided patch with ID ALPS07519142.