First published: Mon Sep 04 2023(Updated: )
In imgsys_cmdq, there is a possible use after free due to a missing valid range checking. This could lead to local escalation of privilege with System execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS07340433; Issue ID: ALPS07340350.
Credit: security@mediatek.com
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Any of | ||
Yocto Project | =4.0 | |
MediaTek IoT Yocto | =23.0 | |
Android | =11.0 | |
Android | =12.0 | |
Linux kernel | =6.1 | |
Any of | ||
MediaTek MT2713 | ||
MediaTek MT6895 | ||
MediaTek MT6897 | ||
MediaTek MT6983 | ||
MediaTek MT8188 | ||
MediaTek MT8195Z | ||
MediaTek MT8395 | ||
MediaTek MT8781 WiFi | ||
Yocto Project | =4.0 | |
MediaTek IoT Yocto | =23.0 | |
Android | =11.0 | |
Android | =12.0 | |
Linux kernel | =6.1 | |
MediaTek MT2713 | ||
MediaTek MT6895 | ||
MediaTek MT6897 | ||
MediaTek MT6983 | ||
MediaTek MT8188 | ||
MediaTek MT8195Z | ||
MediaTek MT8395 | ||
MediaTek MT8781 WiFi |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-20849 is a vulnerability in imgsys_cmdq that allows for a use after free, potentially leading to local escalation of privilege.
Linuxfoundation Yocto 4.0, Mediatek Iot Yocto 23.0, Google Android 11.0 and 12.0, and Linux Linux Kernel 6.1 are affected by CVE-2023-20849.
CVE-2023-20849 has a severity rating of 6.5 out of 10, making it a medium-severity vulnerability.
The patch ID for CVE-2023-20849 is ALPS07340433.
Yes, user interaction is needed for the exploitation of CVE-2023-20849.