In disp, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06535964; Issue ID: ALPS06535964.
References
Link | Resource |
---|---|
https://corp.mediatek.com/product-security-bulletin/January-2023 | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
10 Jan 2023, 03:05
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:* cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:* cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:* |
|
First Time |
Mediatek mt6785
Mediatek mt6739 Mediatek mt6768 Mediatek mt6771 Mediatek mt6763 Mediatek mt6761 Mediatek mt6735 Mediatek mt6765 Mediatek Mediatek mt6757 Mediatek mt6789 Google android Mediatek mt6737 Mediatek mt6753 Mediatek mt6779 |
|
CWE | CWE-662 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.4 |
References | (MISC) https://corp.mediatek.com/product-security-bulletin/January-2023 - Vendor Advisory |
03 Jan 2023, 21:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-01-03 21:15
Updated : 2023-12-10 14:48
NVD link : CVE-2022-32648
Mitre link : CVE-2022-32648
CVE.ORG link : CVE-2022-32648
JSON object : View
Products Affected
mediatek
- mt6737
- mt6761
- mt6757
- mt6771
- mt6735
- mt6789
- mt6765
- mt6739
- mt6779
- mt6785
- mt6768
- mt6753
- mt6763
- android
CWE
CWE-662
Improper Synchronization