First published: Mon Aug 07 2023(Updated: )
In imgsys, there is a possible memory corruption due to improper input validation. This could lead to local escalation of privilege with System execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS07420968; Issue ID: ALPS07420976.
Credit: security@mediatek.com security@mediatek.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linuxfoundation Yocto | =4.0 | |
Google Android | =12.0 | |
Google Android | =13.0 | |
Mediatek Mt6879 | ||
Mediatek Mt6895 | ||
Mediatek Mt6983 | ||
Mediatek Mt8188 | ||
Mediatek Mt8195 | ||
Mediatek Mt8395 | ||
Mediatek Mt8781 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-20802 is a vulnerability in imgsys that allows for possible memory corruption due to improper input validation, potentially leading to local escalation of privilege with System execution privileges needed.
CVE-2023-20802 has a severity rating of 6.5 (medium).
CVE-2023-20802 affects Linuxfoundation Yocto 4.0, Google Android 12.0, and Google Android 13.0.
No, Mediatek Mt6879 is not vulnerable to CVE-2023-20802.
To patch CVE-2023-20802, apply the patch ID ALPS07420968 for imgsys.