First published: Mon Sep 04 2023(Updated: )
In camsys, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07341261; Issue ID: ALPS07326570.
Credit: security@mediatek.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Any of | ||
Yocto Project | =4.0 | |
MediaTek IoT Yocto | =23.0 | |
Google Android | =12.0 | |
Google Android | =13.0 | |
Any of | ||
MediaTek MT6895 | ||
MediaTek MT6983 | ||
MediaTek MT8188 | ||
MediaTek MT8195Z | ||
MediaTek MT8395 | ||
MediaTek MT8781 WiFi | ||
Yocto Project | =4.0 | |
MediaTek IoT Yocto | =23.0 | |
Google Android | =12.0 | |
Google Android | =13.0 | |
MediaTek MT6895 | ||
MediaTek MT6983 | ||
MediaTek MT8188 | ||
MediaTek MT8195Z | ||
MediaTek MT8395 | ||
MediaTek MT8781 WiFi |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-20835 is a vulnerability in camsys that allows for a possible use after free due to a race condition, leading to local escalation of privilege with System execution privileges needed.
The severity of CVE-2023-20835 is medium with a CVSS score of 6.4.
Linux Foundation Yocto 4.0, Mediatek IoT Yocto 23.0, Google Android 12.0, Google Android 13.0
No, Mediatek Mt6895 is not vulnerable to CVE-2023-20835.
Patch ID: ALPS07341261; Issue ID: ALPS07326570. Please refer to the vendor's product security bulletin for more information: https://corp.mediatek.com/product-security-bulletin/September-2023