In camsys, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07341261; Issue ID: ALPS07326570.
References
Link | Resource |
---|---|
https://corp.mediatek.com/product-security-bulletin/September-2023 | Vendor Advisory |
https://corp.mediatek.com/product-security-bulletin/September-2023 | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 07:41
Type | Values Removed | Values Added |
---|---|---|
References | () https://corp.mediatek.com/product-security-bulletin/September-2023 - Vendor Advisory |
07 Sep 2023, 19:13
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-416 CWE-362 |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.4 |
References | (MISC) https://corp.mediatek.com/product-security-bulletin/September-2023 - Vendor Advisory | |
CPE | cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:* cpe:2.3:a:mediatek:iot_yocto:23.0:*:*:*:*:*:*:* cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8395:-:*:*:*:*:*:*:* cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:* cpe:2.3:a:linuxfoundation:yocto:4.0:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:* |
|
First Time |
Mediatek mt8188
Mediatek mt8395 Linuxfoundation yocto Mediatek Mediatek mt8195 Google android Mediatek mt6895 Mediatek iot Yocto Mediatek mt8781 Mediatek mt6983 Linuxfoundation |
04 Sep 2023, 03:51
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-09-04 03:15
Updated : 2024-11-21 07:41
NVD link : CVE-2023-20835
Mitre link : CVE-2023-20835
CVE.ORG link : CVE-2023-20835
JSON object : View
Products Affected
mediatek
- iot_yocto
- mt8188
- mt8395
- mt8781
- mt8195
- mt6983
- mt6895
- android
linuxfoundation
- yocto