In wlan, there is a possible use after free due to an incorrect status check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07299425; Issue ID: ALPS07299425.
References
Link | Resource |
---|---|
https://corp.mediatek.com/product-security-bulletin/October-2022 | Vendor Advisory |
https://corp.mediatek.com/product-security-bulletin/October-2022 | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 07:06
Type | Values Removed | Values Added |
---|---|---|
References | () https://corp.mediatek.com/product-security-bulletin/October-2022 - Vendor Advisory |
08 Aug 2023, 14:21
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-754 |
Information
Published : 2022-10-07 20:15
Updated : 2024-11-21 07:06
NVD link : CVE-2022-32590
Mitre link : CVE-2022-32590
CVE.ORG link : CVE-2022-32590
JSON object : View
Products Affected
mediatek
- mt8786
- mt8696
- mt6761
- mt8512a
- mt8788
- mt6877
- mt8532
- mt8365
- mt6762
- mt6768
- mt6781
- mt8183
- mt7921
- mt8695
- mt8766
- mt8167s
- mt7668
- mt6883
- mt6853
- mt8175
- mt7902
- mt8768
- mt6889
- mt6833
- mt8789
- mt6769
- mt8667
- mt8385
- mt6893
- mt8362a
- mt6785
- mt6789
- mt6873
- mt8518
- mt6891
- mt6853t
- mt6885
- mt8185
- mt6855
- mt7663
- mt6879
- mt6779
- mt6765
- mt6983
- mt6895
- android
linuxfoundation
- yocto
CWE
CWE-754
Improper Check for Unusual or Exceptional Conditions