6.5

CVE-2023-20849

In imgsys_cmdq, there is a possible use after free due to a missing valid range checking. This could lead to local escalation of privilege with System execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS07340433; Issue ID: ALPS07340350.

Data is provided by the National Vulnerability Database (NVD)
LinuxfoundationYocto Version4.0
   MediatekMt2713 Version-
   MediatekMt6895 Version-
   MediatekMt6897 Version-
   MediatekMt6983 Version-
   MediatekMt8188 Version-
   MediatekMt8195 Version-
   MediatekMt8395 Version-
   MediatekMt8781 Version-
MediatekIot Yocto Version23.0
   MediatekMt2713 Version-
   MediatekMt6895 Version-
   MediatekMt6897 Version-
   MediatekMt6983 Version-
   MediatekMt8188 Version-
   MediatekMt8195 Version-
   MediatekMt8395 Version-
   MediatekMt8781 Version-
GoogleAndroid Version11.0
   MediatekMt2713 Version-
   MediatekMt6895 Version-
   MediatekMt6897 Version-
   MediatekMt6983 Version-
   MediatekMt8188 Version-
   MediatekMt8195 Version-
   MediatekMt8395 Version-
   MediatekMt8781 Version-
GoogleAndroid Version12.0
   MediatekMt2713 Version-
   MediatekMt6895 Version-
   MediatekMt6897 Version-
   MediatekMt6983 Version-
   MediatekMt8188 Version-
   MediatekMt8195 Version-
   MediatekMt8395 Version-
   MediatekMt8781 Version-
LinuxLinux Kernel Version6.1 Update-
   MediatekMt2713 Version-
   MediatekMt6895 Version-
   MediatekMt6897 Version-
   MediatekMt6983 Version-
   MediatekMt8188 Version-
   MediatekMt8195 Version-
   MediatekMt8395 Version-
   MediatekMt8781 Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.02% 0.042
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 6.5 0.6 5.9
CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H
134c704f-9b21-4f2e-91b3-4a467353bcc0 6.5 0.6 5.9
CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H
CWE-416 Use After Free

The product reuses or references memory after it has been freed. At some point afterward, the memory may be allocated again and saved in another pointer, while the original pointer references a location somewhere within the new allocation. Any operations using the original pointer are no longer valid because the memory "belongs" to the code that operates on the new pointer.