SB2023080746 - Multiple vulnerabilities in MediaTek chipsets
Published: August 7, 2023
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 35 secuirty vulnerabilities.
1) Improper input validation (CVE-ID: CVE-2023-20810)
The vulnerability allows a local privileged application to gain access to sensitive information.
The vulnerability exists due to improper input validation within IOMMU. A local privileged application can gain access to sensitive information.
2) Out-of-bounds write (CVE-ID: CVE-2023-20804)
The vulnerability allows a local privileged application to execute arbitrary code.
The vulnerability exists due to a missing bounds check within imgsys. A local privileged application can execute arbitrary code.
3) Out-of-bounds write (CVE-ID: CVE-2023-20805)
The vulnerability allows a local privileged application to execute arbitrary code.
The vulnerability exists due to a missing bounds check within imgsys. A local privileged application can execute arbitrary code.
4) Write-what-where Condition (CVE-ID: CVE-2023-20806)
The vulnerability allows a local privileged application to execute arbitrary code.
The vulnerability exists due to a missing bounds check within hcp. A local privileged application can execute arbitrary code.
5) Improper input validation (CVE-ID: CVE-2023-20807)
The vulnerability allows a local privileged application to execute arbitrary code.
The vulnerability exists due to a missing bounds check within dpe. A local privileged application can execute arbitrary code.
6) Out-of-bounds write (CVE-ID: CVE-2023-20808)
The vulnerability allows a local privileged application to execute arbitrary code.
The vulnerability exists due to a missing bounds check within OPTEE. A local privileged application can execute arbitrary code.
7) Out-of-bounds write (CVE-ID: CVE-2023-20809)
The vulnerability allows a local privileged application to execute arbitrary code.
The vulnerability exists due to a missing bounds check within vdec. A local privileged application can execute arbitrary code.
8) Out-of-bounds write (CVE-ID: CVE-2023-20811)
The vulnerability allows a local privileged application to execute arbitrary code.
The vulnerability exists due to a missing bounds check within IOMMU. A local privileged application can execute arbitrary code.
9) Memory corruption (CVE-ID: CVE-2023-20802)
The vulnerability allows a local privileged application to execute arbitrary code.
The vulnerability exists due to improper input validation within imgsys. A local privileged application can execute arbitrary code.
10) Improper input validation (CVE-ID: CVE-2023-20812)
The vulnerability allows a local privileged application to execute arbitrary code.
The vulnerability exists due to improper input validation within wlan driver. A local privileged application can execute arbitrary code.
11) Improper input validation (CVE-ID: CVE-2023-20813)
The vulnerability allows a local privileged application to gain access to sensitive information.
The vulnerability exists due to improper input validation within wlan service. A local privileged application can gain access to sensitive information.
12) Improper input validation (CVE-ID: CVE-2023-20814)
The vulnerability allows a local privileged application to execute arbitrary code.
The vulnerability exists due to improper input validation within wlan service. A local privileged application can execute arbitrary code.
13) Improper input validation (CVE-ID: CVE-2023-20815)
The vulnerability allows a local privileged application to execute arbitrary code.
The vulnerability exists due to improper input validation within wlan service. A local privileged application can execute arbitrary code.
14) Improper input validation (CVE-ID: CVE-2023-20816)
The vulnerability allows a local privileged application to execute arbitrary code.
The vulnerability exists due to improper input validation within wlan service. A local privileged application can execute arbitrary code.
15) Improper input validation (CVE-ID: CVE-2023-20817)
The vulnerability allows a local privileged application to execute arbitrary code.
The vulnerability exists due to improper input validation within wlan service. A local privileged application can execute arbitrary code.
16) Improper input validation (CVE-ID: CVE-2023-20818)
The vulnerability allows a local privileged application to gain access to sensitive information.
The vulnerability exists due to improper input validation within wlan service. A local privileged application can gain access to sensitive information.
17) Memory corruption (CVE-ID: CVE-2023-20803)
The vulnerability allows a local privileged application to execute arbitrary code.
The vulnerability exists due to improper input validation within imgsys. A local privileged application can execute arbitrary code.
18) Improper input validation (CVE-ID: CVE-2023-20801)
The vulnerability allows a local privileged application to execute arbitrary code.
The vulnerability exists due to a race condition within imgsys. A local privileged application can execute arbitrary code.
19) Improper input validation (CVE-ID: CVE-2023-20780)
The vulnerability allows a local privileged application to gain access to sensitive information.
The vulnerability exists due to a missing bounds check within keyinstall. A local privileged application can gain access to sensitive information.
20) Time-of-check Time-of-use (TOCTOU) Race Condition (CVE-ID: CVE-2023-20787)
The vulnerability allows a local privileged application to execute arbitrary code.
The vulnerability exists due to a race condition within thermal. A local privileged application can execute arbitrary code.
21) Improper input validation (CVE-ID: CVE-2023-20781)
The vulnerability allows a local privileged application to perform service disruption.
The vulnerability exists due to a missing bounds check within keyinstall. A local privileged application can perform service disruption.
22) Improper input validation (CVE-ID: CVE-2023-20782)
The vulnerability allows a local privileged application to gain access to sensitive information.
The vulnerability exists due to a missing bounds check within keyinstall. A local privileged application can gain access to sensitive information.
23) Improper input validation (CVE-ID: CVE-2023-20783)
The vulnerability allows a local privileged application to execute arbitrary code.
The vulnerability exists due to a missing bounds check within keyinstall. A local privileged application can execute arbitrary code.
24) Improper input validation (CVE-ID: CVE-2023-20784)
The vulnerability allows a local privileged application to execute arbitrary code.
The vulnerability exists due to a missing bounds check within keyinstall. A local privileged application can execute arbitrary code.
25) Time-of-check Time-of-use (TOCTOU) Race Condition (CVE-ID: CVE-2023-20785)
The vulnerability allows a local privileged application to execute arbitrary code.
The vulnerability exists due to a missing bounds check within audio. A local privileged application can execute arbitrary code.
26) Improper input validation (CVE-ID: CVE-2023-20786)
The vulnerability allows a local privileged application to execute arbitrary code.
The vulnerability exists due to a missing bounds check within gps. A local privileged application can execute arbitrary code.
27) Time-of-check Time-of-use (TOCTOU) Race Condition (CVE-ID: CVE-2023-20788)
The vulnerability allows a local privileged application to execute arbitrary code.
The vulnerability exists due to a race condition within thermal. A local privileged application can execute arbitrary code.
28) Improper input validation (CVE-ID: CVE-2023-20800)
The vulnerability allows a local privileged application to execute arbitrary code.
The vulnerability exists due to a mssing ptr check within imgsys. A local privileged application can execute arbitrary code.
29) Improper input validation (CVE-ID: CVE-2023-20789)
The vulnerability allows a local privileged application to gain access to sensitive information.
The vulnerability exists due to a missing bounds check within jpeg. A local privileged application can gain access to sensitive information.
30) Improper input validation (CVE-ID: CVE-2023-20790)
The vulnerability allows a local privileged application to gain access to sensitive information.
The vulnerability exists due to a missing bounds check within nvram. A local privileged application can gain access to sensitive information.
31) Improper input validation (CVE-ID: CVE-2023-20793)
The vulnerability allows a local privileged application to perform service disruption.
The vulnerability exists due to a missing bounds check within apu. A local privileged application can perform service disruption.
32) Improper input validation (CVE-ID: CVE-2023-20795)
The vulnerability allows a local privileged application to execute arbitrary code.
The vulnerability exists due to a missing bounds check within ril. A local privileged application can execute arbitrary code.
33) Improper input validation (CVE-ID: CVE-2023-20796)
The vulnerability allows a local privileged application to perform service disruption.
The vulnerability exists due to an incorrect bounds check within power. A local privileged application can perform service disruption.
34) Out-of-bounds write (CVE-ID: CVE-2023-20797)
The vulnerability allows a local privileged application to execute arbitrary code.
The vulnerability exists due to a missing bounds check within camera middleware. A local privileged application can execute arbitrary code.
35) Out-of-bounds read (CVE-ID: CVE-2023-20798)
The vulnerability allows a local privileged application to gain access to sensitive information.
The vulnerability exists due to an incorrect calculation of buffer size within pda. A local privileged application can gain access to sensitive information.
Remediation
Install update from vendor's website.