First published: Mon Oct 02 2023(Updated: )
In rpmb , there is a possible double free due to improper locking. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07912966; Issue ID: ALPS07912961.
Credit: security@mediatek.com security@mediatek.com
Affected Software | Affected Version | How to fix |
---|---|---|
Google Android | =12.0 | |
Google Android | =13.0 | |
Mediatek Mt6580 | ||
Mediatek Mt6739 | ||
Mediatek Mt6761 | ||
Mediatek Mt6762 | ||
Mediatek Mt6765 | ||
Mediatek Mt6768 | ||
Mediatek Mt6769 | ||
Mediatek Mt6779 | ||
Mediatek Mt6781 | ||
Mediatek Mt6785 | ||
Mediatek Mt6789 | ||
Mediatek Mt6833 | ||
Mediatek Mt6853 | ||
Mediatek Mt6853t | ||
Mediatek Mt6855 | ||
Mediatek Mt6873 | ||
Mediatek Mt6875 | ||
Mediatek Mt6877 | ||
Mediatek Mt6879 | ||
Mediatek Mt6883 | ||
Mediatek Mt6885 | ||
Mediatek Mt6889 | ||
Mediatek Mt6891 | ||
Mediatek Mt6893 | ||
Mediatek Mt6895 | ||
Mediatek Mt6983 | ||
Mediatek Mt6985 | ||
Mediatek Mt8666 | ||
Mediatek Mt8765 | ||
Mediatek Mt8788 | ||
All of | ||
Any of | ||
Google Android | =12.0 | |
Google Android | =13.0 | |
Any of | ||
Mediatek Mt6580 | ||
Mediatek Mt6739 | ||
Mediatek Mt6761 | ||
Mediatek Mt6762 | ||
Mediatek Mt6765 | ||
Mediatek Mt6768 | ||
Mediatek Mt6769 | ||
Mediatek Mt6779 | ||
Mediatek Mt6781 | ||
Mediatek Mt6785 | ||
Mediatek Mt6789 | ||
Mediatek Mt6833 | ||
Mediatek Mt6853 | ||
Mediatek Mt6853t | ||
Mediatek Mt6855 | ||
Mediatek Mt6873 | ||
Mediatek Mt6875 | ||
Mediatek Mt6877 | ||
Mediatek Mt6879 | ||
Mediatek Mt6883 | ||
Mediatek Mt6885 | ||
Mediatek Mt6889 | ||
Mediatek Mt6891 | ||
Mediatek Mt6893 | ||
Mediatek Mt6895 | ||
Mediatek Mt6983 | ||
Mediatek Mt6985 | ||
Mediatek Mt8666 | ||
Mediatek Mt8765 | ||
Mediatek Mt8788 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2023-32824.
The severity of CVE-2023-32824 is medium with a CVSS score of 6.7.
This vulnerability can be exploited locally without user interaction.
No, user interaction is not needed for exploitation.
Yes, a patch is available for CVE-2023-32824. Please refer to the provided reference for more information.