First published: Mon Sep 04 2023(Updated: )
In imgsys, there is a possible out of bounds read due to a race condition. This could lead to local information disclosure with System execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS07326455; Issue ID: ALPS07326418.
Credit: security@mediatek.com
Affected Software | Affected Version | How to fix |
---|---|---|
Yocto Project | =3.1 | |
Yocto Project | =3.3 | |
Yocto Project | =4.0 | |
Android | =12.0 | |
Android | =13.0 | |
Linux Kernel | =4.19 | |
MediaTek MT2713 | ||
MediaTek MT5221 | ||
MediaTek MT6833 | ||
MediaTek MT6853 | ||
MediaTek MT6855 | ||
MediaTek MT6873 | ||
MediaTek MT6877 | ||
MediaTek MT6879 | ||
MediaTek MT6883 | ||
MediaTek MT6885 | ||
MediaTek MT6890 | ||
MediaTek MT6893 | ||
MediaTek MT6895 | ||
MediaTek MT6983 | ||
MediaTek MT8167 | ||
MediaTek MT8168 | ||
MediaTek MT8173 | ||
MediaTek MT8175 Firmware | ||
MediaTek MT8185 | ||
MediaTek MT8188 | ||
MediaTek MT8188T | ||
MediaTek MT8195Z | ||
MediaTek MT8321 | ||
MediaTek MT8365 Firmware | ||
MediaTek MT8385 Firmware | ||
MediaTek MT8518S Firmware | ||
MediaTek MT8532 | ||
MediaTek MT8666 | ||
MediaTek MT8673 | ||
MediaTek MT8765 | ||
MediaTek MT8766Z | ||
MediaTek MT8768 | ||
MediaTek MT8781 WiFi | ||
MediaTek MT8786 | ||
MediaTek MT8788 Firmware | ||
MediaTek MT8789 | ||
MediaTek MT8791 WiFi | ||
MediaTek MT8791T | ||
MediaTek MT8797 WiFi |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-20838 is medium.
The affected software for CVE-2023-20838 includes Linuxfoundation Yocto (versions 3.1, 3.3, and 4.0), Google Android (versions 12.0 and 13.0), and Linux Linux Kernel (version 4.19).
Yes, user interaction is needed for exploitation of CVE-2023-20838.
The patch ID for CVE-2023-20838 is ALPS07326455.
You can find more information about CVE-2023-20838 at the following reference: https://corp.mediatek.com/product-security-bulletin/September-2023.