CVE-2023-20744

In vcu, there is a possible use after free due to a logic error. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07519142; Issue ID: ALPS07519200.
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:a:linuxfoundation:iot-yocto:22.2:*:*:*:*:*:*:*
cpe:2.3:a:linuxfoundation:yocto:4.0:*:*:*:*:*:*:*
cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*
cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*
OR cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8395:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*

History

07 Jan 2025, 21:15

Type Values Removed Values Added
References (MISC) https://corp.mediatek.com/product-security-bulletin/June-2023 - Vendor Advisory () https://corp.mediatek.com/product-security-bulletin/June-2023 - Vendor Advisory

09 Jun 2023, 03:54

Type Values Removed Values Added
First Time Mediatek mt8195
Mediatek mt8395
Mediatek mt8797
Mediatek mt6789
Mediatek
Linuxfoundation
Mediatek mt6855
Linuxfoundation yocto
Mediatek mt8791
Mediatek mt8786
Mediatek mt8185
Mediatek mt8781
Linuxfoundation iot-yocto
Mediatek mt8789
Mediatek mt8365
Google android
Google
CPE cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*
cpe:2.3:a:linuxfoundation:iot-yocto:22.2:*:*:*:*:*:*:*
cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:*
cpe:2.3:a:linuxfoundation:yocto:4.0:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*
cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8395:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8195:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*
References (MISC) https://corp.mediatek.com/product-security-bulletin/June-2023 - (MISC) https://corp.mediatek.com/product-security-bulletin/June-2023 - Vendor Advisory
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.7
CWE CWE-416

06 Jun 2023, 13:36

Type Values Removed Values Added
New CVE

Information

Published : 2023-06-06 13:15

Updated : 2025-01-07 21:15


NVD link : CVE-2023-20744

Mitre link : CVE-2023-20744


JSON object : View

Products Affected

mediatek

  • mt8789
  • mt8365
  • mt8395
  • mt8781
  • mt8786
  • mt6789
  • mt6855
  • mt8185
  • mt8791
  • mt8797
  • mt8195

linuxfoundation

  • yocto
  • iot-yocto

google

  • android
CWE
CWE-416

Use After Free