In m4u, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS05403499; Issue ID: ALPS05425810.
References
Link | Resource |
---|---|
https://corp.mediatek.com/product-security-bulletin/September-2021 | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
02 Oct 2021, 02:08
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:h:mediatek:mt6735:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6592e:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6582_90:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6752:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6592w:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6757cd:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6757ch:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6582e:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6755:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6795:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6755s:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6592_90:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6595:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6732:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6771:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6750:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6753:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6589td:-:*:*:*:*:*:*:* cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6592t:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6580:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6757:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6757c:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6799:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:* cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6737:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6582h:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6592h:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6582t:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6797:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6763:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6731:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6750s:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6758:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6582w:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6589:-:*:*:*:*:*:*:* |
|
References | (MISC) https://corp.mediatek.com/product-security-bulletin/September-2021 - Vendor Advisory | |
CWE | CWE-416 | |
CVSS |
v2 : v3 : |
v2 : 4.6
v3 : 7.8 |
27 Sep 2021, 13:55
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-09-27 12:15
Updated : 2024-02-04 22:08
NVD link : CVE-2021-0611
Mitre link : CVE-2021-0611
CVE.ORG link : CVE-2021-0611
JSON object : View
Products Affected
mediatek
- mt6779
- mt6758
- mt6589
- mt6771
- mt6582w
- mt6732
- mt6582t
- mt6763
- mt6875
- mt6891
- mt6893
- mt6735
- mt6797
- mt6765
- mt6799
- mt6755s
- mt6785
- mt6873
- mt6853t
- mt6592w
- mt6757cd
- mt6589td
- mt6592_90
- mt6885
- mt6883
- mt6795
- mt6582_90
- mt6582e
- mt6592h
- mt6877
- mt6757c
- mt6761
- mt6595
- mt6853
- mt6757ch
- mt6592t
- mt6592e
- mt6757
- mt6768
- mt6750
- mt6833
- mt6582h
- mt6755
- mt6580
- mt6889
- mt6753
- mt6731
- mt6750s
- mt6769
- mt6739
- mt6762
- mt6752
- mt6737
- android
CWE
CWE-416
Use After Free