CVE-2023-20664

CVSS V2 None CVSS V3 None
Description
In gz, there is a possible double free due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07505952; Issue ID: ALPS07505952.
Overview
  • CVE ID
  • CVE-2023-20664
  • Assigner
  • security@mediatek.com
  • Vulnerability Status
  • Analyzed
  • Published Version
  • 2023-04-06T18:15:09
  • Last Modified Date
  • 2023-04-13T17:29:52
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
AND
cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt8696:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt8771:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt8791t:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt8795t:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt8871:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:mediatek:mt8891:-:*:*:*:*:*:*:* 0 OR
References
Reference URL Reference Tags
https://corp.mediatek.com/product-security-bulletin/April-2023 Vendor Advisory
History
Created Old Value New Value Data Type Notes
2023-04-17 04:17:52 Added to TrackCVE
2023-04-17 04:17:55 Weakness Enumeration new