First published: Mon Sep 04 2023(Updated: )
In imgsys, there is a possible out of bounds read due to a missing valid range checking. This could lead to local information disclosure with System execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS07326455; Issue ID: ALPS07326409.
Credit: security@mediatek.com
Affected Software | Affected Version | How to fix |
---|---|---|
Yocto Project | =4.0 | |
MediaTek IoT Yocto | =23.0 | |
Android | =11.0 | |
Android | =12.0 | |
Linux kernel | =6.1 | |
MediaTek MT2713 | ||
MediaTek MT6895 | ||
MediaTek MT6897 | ||
MediaTek MT6983 | ||
MediaTek MT8188 | ||
MediaTek MT8195Z | ||
MediaTek MT8395 | ||
MediaTek MT8673 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-20839 is medium (4.2).
The affected software includes Linuxfoundation Yocto 4.0, Mediatek Iot Yocto 23.0, Google Android 11.0 and 12.0, and Linux Linux Kernel 6.1.
Exploiting CVE-2023-20839 requires user interaction.
Yes, the patch ID is ALPS07326455 and the issue ID is ALPS07326409.
More information about CVE-2023-20839 can be found at https://corp.mediatek.com/product-security-bulletin/September-2023.