CVE-2022-20031

In fb driver, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05850708; Issue ID: ALPS05850708.
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*
cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*
OR cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6582_90:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6582e:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6582h:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6582t:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6582w:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6589:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6589td:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6592_90:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6592e:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6592h:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6592t:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6592w:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6595:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6732:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6750:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6752:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6755:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6755s:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6758:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6795:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6797:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6799:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*

History

11 Feb 2022, 20:33

Type Values Removed Values Added
CPE cpe:2.3:h:mediatek:mt6799:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6795:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6752:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6592_90:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6582h:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6732:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6582_90:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6592e:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6595:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6758:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6582e:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6755s:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6589td:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6589:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6582w:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6797:-:*:*:*:*:*:*:*
cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6592w:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6592t:-:*:*:*:*:*:*:*
cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6592h:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6582t:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6750:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6755:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*
cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:*
CWE CWE-416
First Time Mediatek mt6589
Mediatek mt6883
Mediatek mt6757
Mediatek mt6757c
Mediatek mt6763
Mediatek mt6592e
Mediatek mt6885
Mediatek mt6853t
Mediatek mt6891
Mediatek mt6732
Mediatek mt6753
Mediatek mt6589td
Mediatek mt6582h
Mediatek mt6737
Mediatek mt6757ch
Mediatek mt6757cd
Google
Mediatek mt6785
Mediatek mt6875
Mediatek mt6781
Mediatek mt6833
Mediatek mt6592 90
Mediatek mt6580
Mediatek mt6735
Mediatek mt6768
Mediatek mt6762
Mediatek mt6750
Mediatek mt6755
Mediatek mt6877
Mediatek
Mediatek mt6592w
Mediatek mt6761
Mediatek mt6731
Mediatek mt6755s
Mediatek mt6758
Mediatek mt6795
Mediatek mt6779
Mediatek mt6771
Mediatek mt6853
Mediatek mt6739
Mediatek mt6582t
Google android
Mediatek mt6752
Mediatek mt6595
Mediatek mt6592h
Mediatek mt6765
Mediatek mt6893
Mediatek mt6889
Mediatek mt6873
Mediatek mt6750s
Mediatek mt6769
Mediatek mt6582w
Mediatek mt6582e
Mediatek mt6582 90
Mediatek mt6797
Mediatek mt6592t
Mediatek mt6799
References (MISC) https://corp.mediatek.com/product-security-bulletin/February-2022 - (MISC) https://corp.mediatek.com/product-security-bulletin/February-2022 - Vendor Advisory
CVSS v2 : unknown
v3 : unknown
v2 : 4.6
v3 : 7.8

09 Feb 2022, 23:15

Type Values Removed Values Added
New CVE

Information

Published : 2022-02-09 23:15

Updated : 2023-12-10 14:22


NVD link : CVE-2022-20031

Mitre link : CVE-2022-20031

CVE.ORG link : CVE-2022-20031


JSON object : View

Products Affected

mediatek

  • mt6875
  • mt6893
  • mt6853t
  • mt6582w
  • mt6853
  • mt6582e
  • mt6797
  • mt6755
  • mt6762
  • mt6883
  • mt6799
  • mt6592_90
  • mt6757ch
  • mt6592h
  • mt6833
  • mt6758
  • mt6589
  • mt6589td
  • mt6889
  • mt6785
  • mt6752
  • mt6768
  • mt6755s
  • mt6580
  • mt6582_90
  • mt6731
  • mt6582t
  • mt6750
  • mt6750s
  • mt6592e
  • mt6753
  • mt6765
  • mt6873
  • mt6595
  • mt6885
  • mt6739
  • mt6771
  • mt6732
  • mt6779
  • mt6891
  • mt6877
  • mt6757c
  • mt6735
  • mt6769
  • mt6592t
  • mt6795
  • mt6763
  • mt6781
  • mt6761
  • mt6592w
  • mt6582h
  • mt6757
  • mt6757cd
  • mt6737

google

  • android
CWE
CWE-416

Use After Free