In apusys driver, there is a possible system crash due to an integer overflow. This could lead to local denial of service with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS06479532; Issue ID: ALPS06479532.
References
Link | Resource |
---|---|
https://corp.mediatek.com/product-security-bulletin/June-2022 | Vendor Advisory |
https://corp.mediatek.com/product-security-bulletin/June-2022 | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 06:45
Type | Values Removed | Values Added |
---|---|---|
References | () https://corp.mediatek.com/product-security-bulletin/June-2022 - Vendor Advisory |
13 Jun 2022, 18:59
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 4.9
v3 : 4.4 |
References | (MISC) https://corp.mediatek.com/product-security-bulletin/June-2022 - Vendor Advisory | |
CWE | CWE-190 | |
CPE | cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:* cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6769:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8168:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8695:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8696:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6853t:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8675:-:*:*:*:*:*:*:* cpe:2.3:o:google:android:10.0:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8183:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:* cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:* |
06 Jun 2022, 18:27
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-06-06 18:15
Updated : 2024-11-21 06:45
NVD link : CVE-2022-21761
Mitre link : CVE-2022-21761
CVE.ORG link : CVE-2022-21761
JSON object : View
Products Affected
mediatek
- mt6833
- mt6879
- mt8675
- mt6762
- mt8667
- mt8766
- mt6761
- mt8768
- mt6889
- mt8788
- mt6895
- mt8362a
- mt8175
- mt6883
- mt8183
- mt6893
- mt8797
- mt6853
- mt6785
- mt6983
- mt8365
- mt6765
- mt8786
- mt6769
- mt8167s
- mt6768
- mt8695
- mt8791
- mt6779
- mt6789
- mt6873
- mt6781
- mt6985
- mt6875
- mt8696
- mt6891
- mt8385
- mt6885
- mt8789
- mt6877
- mt6853t
- mt8185
- mt8168
- android
CWE
CWE-190
Integer Overflow or Wraparound