CVE-2023-20611

CVSS V2 None CVSS V3 None
Description
In gpu, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07588678; Issue ID: ALPS07588678.
Overview
  • CVE ID
  • CVE-2023-20611
  • Assigner
  • security@mediatek.com
  • Vulnerability Status
  • Analyzed
  • Published Version
  • 2023-02-06T20:15:14
  • Last Modified Date
  • 2023-02-14T17:39:25
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
AND
cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:* 0 OR
References
Reference URL Reference Tags
https://corp.mediatek.com/product-security-bulletin/February-2023 Vendor Advisory
History
Created Old Value New Value Data Type Notes
2023-04-17 07:18:02 Added to TrackCVE
2023-04-17 07:18:04 Weakness Enumeration new