In lk, there is a possible escalation of privilege due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS08528255; Issue ID: ALPS08528255.
Metrics
Affected Vendors & Products
References
History
Thu, 30 Jan 2025 15:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Google
Google android Linuxfoundation Linuxfoundation yocto Mediatek Mediatek mt2737 Mediatek mt6789 Mediatek mt6835 Mediatek mt6855 Mediatek mt6879 Mediatek mt6880 Mediatek mt6886 Mediatek mt6890 Mediatek mt6895 Mediatek mt6980 Mediatek mt6983 Mediatek mt6985 Mediatek mt6989 Mediatek mt6990 Mediatek mt8321 Mediatek mt8385 Mediatek mt8666 Mediatek mt8667 Mediatek mt8673 Mediatek mt8765 Mediatek mt8766 Mediatek mt8768 Mediatek mt8781 Mediatek mt8786 Mediatek mt8788 Mediatek mt8789 Mediatek mt8791 Mediatek mt8796 Mediatek mt8797 Mediatek mt8798 Openwrt Openwrt openwrt Rdkcentral Rdkcentral rdkb |
|
Weaknesses | NVD-CWE-noinfo | |
CPEs | cpe:2.3:a:linuxfoundation:yocto:3.3:*:*:*:*:*:*:* cpe:2.3:a:rdkcentral:rdkb:2022q3:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt2737:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6880:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6890:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6980:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8321:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8666:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8673:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8765:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8781:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8791:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8796:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8797:-:*:*:*:*:*:*:* cpe:2.3:h:mediatek:mt8798:-:*:*:*:*:*:*:* cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:* cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:* cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:* cpe:2.3:o:openwrt:openwrt:19.07.0:-:*:*:*:*:*:* cpe:2.3:o:openwrt:openwrt:21.02.0:-:*:*:*:*:*:* |
|
Vendors & Products |
Google
Google android Linuxfoundation Linuxfoundation yocto Mediatek Mediatek mt2737 Mediatek mt6789 Mediatek mt6835 Mediatek mt6855 Mediatek mt6879 Mediatek mt6880 Mediatek mt6886 Mediatek mt6890 Mediatek mt6895 Mediatek mt6980 Mediatek mt6983 Mediatek mt6985 Mediatek mt6989 Mediatek mt6990 Mediatek mt8321 Mediatek mt8385 Mediatek mt8666 Mediatek mt8667 Mediatek mt8673 Mediatek mt8765 Mediatek mt8766 Mediatek mt8768 Mediatek mt8781 Mediatek mt8786 Mediatek mt8788 Mediatek mt8789 Mediatek mt8791 Mediatek mt8796 Mediatek mt8797 Mediatek mt8798 Openwrt Openwrt openwrt Rdkcentral Rdkcentral rdkb |
|
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: MediaTek
Published:
Updated: 2024-08-26T20:58:33.319Z
Reserved: 2023-11-02T13:35:35.151Z
Link: CVE-2024-20022

Updated: 2024-08-01T21:52:31.656Z

Status : Analyzed
Published: 2024-03-04T03:15:07.150
Modified: 2025-01-30T15:11:44.910
Link: CVE-2024-20022

No data.