Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2022-32589 (GCVE-0-2022-32589)
Vulnerability from cvelistv5
- Denial of Service
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T07:46:43.617Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://corp.mediatek.com/product-security-bulletin/October-2022" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "MT6761, MT6762, MT6765, MT6768, MT6779, MT6781, MT6785, MT6789, MT6833, MT6853, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6889, MT6891, MT6893, MT6895, MT6983, MT7663, MT7668, MT7902, MT7921, MT8167S, MT8175, MT8183, MT8185, MT8362A, MT8365, MT8385, MT8512A, MT8518, MT8532, MT8667, MT8766, MT8768, MT8786, MT8788, MT8789", "vendor": "MediaTek, Inc.", "versions": [ { "status": "affected", "version": "Android 11.0, 12.0 and Yocto 3.1, 3.3" } ] } ], "descriptions": [ { "lang": "en", "value": "In Wi-Fi driver, there is a possible way to disconnect Wi-Fi due to an improper resource release. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07030600; Issue ID: ALPS07030600." } ], "problemTypes": [ { "descriptions": [ { "description": "Denial of Service", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-10-07T00:00:00", "orgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374", "shortName": "MediaTek" }, "references": [ { "url": "https://corp.mediatek.com/product-security-bulletin/October-2022" } ] } }, "cveMetadata": { "assignerOrgId": "ee979b05-11f8-4f25-a7e0-a1fa9c190374", "assignerShortName": "MediaTek", "cveId": "CVE-2022-32589", "datePublished": "2022-10-07T00:00:00", "dateReserved": "2022-06-09T00:00:00", "dateUpdated": "2024-08-03T07:46:43.617Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2022-32589\",\"sourceIdentifier\":\"security@mediatek.com\",\"published\":\"2022-10-07T20:15:14.687\",\"lastModified\":\"2024-11-21T07:06:41.423\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"In Wi-Fi driver, there is a possible way to disconnect Wi-Fi due to an improper resource release. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07030600; Issue ID: ALPS07030600.\"},{\"lang\":\"es\",\"value\":\"En Wi-Fi driver, se presenta una posible forma de desconectar el Wi-Fi debido a una liberaci\u00f3n inapropiada de recursos. Esto podr\u00eda conllevar a una denegaci\u00f3n de servicio remota sin necesidad de privilegios de ejecuci\u00f3n adicionales. No es requerida una interacci\u00f3n del usuario para su explotaci\u00f3n. ID de parche: ALPS07030600; ID de incidencia: ALPS07030600\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-404\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:linuxfoundation:yocto:3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2EECB3C-723A-492D-A6D7-6A1A73EDBFDF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:linuxfoundation:yocto:3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2385F2C9-3EA1-424B-AB8D-A672BF1CBE56\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"109DD7FD-3A48-4C3D-8E1A-4433B98E1E64\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8FB8EE9-FC56-4D5E-AE55-A5967634740C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F726F486-A86F-4215-AD93-7A07A071844A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C445EB80-6021-4E26-B74E-1B4B6910CE48\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43E779F6-F0A0-4153-9A1D-B715C3A2F80E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"06CD97E1-8A76-48B4-9780-9698EF5A960F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBA369B8-8E23-492B-82CC-23114E6A5D1C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C4EEE021-6B2A-47A0-AC6B-55525A40D718\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A82E0A4F-072F-474C-B94C-8114ABE05639\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B9B0D82-82C1-4A77-A016-329B99C45F49\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9814939B-F05E-4870-90C0-7C0F6BAAEB39\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"366F1912-756B-443E-9962-224937DD7DFB\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"704BE5CE-AE08-4432-A8B0-4C8BD62148AD\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"15E2EC3F-9FB3-488B-B1C1-2793A416C755\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD64413C-C774-4C4F-9551-89E1AA9469EE\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B787DC3-8E5A-4968-B20B-37B6257FAAE2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D8E91CA4-CA5B-40D1-9A96-2B875104BCF4\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"213B5C7F-D965-4312-9CDF-4F06FA77D401\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E0CA45C9-7BFE-4C93-B2AF-B86501F763AB\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt7663:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"10C79211-F064-499D-914E-0BACD038FBF4\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt7668:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E400AB9-B82A-4449-8789-35112940270F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt7902:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"91DEA745-47A8-43F1-A1B2-F53F651A99EF\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt7921:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"32AFEA0A-FFE2-4EA9-8B51-7E3E75DE65CC\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"639C5BDE-2E83-427A-BAB7-85EA9348AC68\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"582F1041-CD84-4763-AD6F-E08DD11F689F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt8183:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"23F65D7B-31A1-4D94-82E9-254A7A6D7BE1\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62FDE8E0-FD9F-4D2B-944C-E17F34A09F06\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97C76F98-5D8D-4E52-ABAF-CD27C1205B0E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"299378ED-41CE-4966-99B1-65D2BA1215EF\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt8512a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ABD3F702-DE9F-4481-8098-02A7B83F9868\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt8518:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE5E73E0-EF8D-4659-B447-66474BC05708\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt8532:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE18D5C2-0423-4CE5-86E7-69E7BB131BBF\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2FE14B46-C1CA-465F-8578-059FA2ED30EB\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE45F606-2E75-48BC-9D1B-99D504974CBF\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE10C121-F2AD-43D2-8FF9-A6C197858220\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1505AD53-987E-4328-8E1D-F5F1EC12B677\"}]}]}],\"references\":[{\"url\":\"https://corp.mediatek.com/product-security-bulletin/October-2022\",\"source\":\"security@mediatek.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://corp.mediatek.com/product-security-bulletin/October-2022\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}" } }
ghsa-868x-3mgq-qgcx
Vulnerability from github
In Wi-Fi driver, there is a possible way to disconnect Wi-Fi due to an improper resource release. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07030600; Issue ID: ALPS07030600.
{ "affected": [], "aliases": [ "CVE-2022-32589" ], "database_specific": { "cwe_ids": [ "CWE-404" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2022-10-07T20:15:00Z", "severity": "HIGH" }, "details": "In Wi-Fi driver, there is a possible way to disconnect Wi-Fi due to an improper resource release. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07030600; Issue ID: ALPS07030600.", "id": "GHSA-868x-3mgq-qgcx", "modified": "2022-10-12T19:00:40Z", "published": "2022-10-08T00:00:16Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32589" }, { "type": "WEB", "url": "https://corp.mediatek.com/product-security-bulletin/October-2022" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "type": "CVSS_V3" } ] }
gsd-2022-32589
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2022-32589", "description": "In Wi-Fi driver, there is a possible way to disconnect Wi-Fi due to an improper resource release. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07030600; Issue ID: ALPS07030600.", "id": "GSD-2022-32589" }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2022-32589" ], "details": "In Wi-Fi driver, there is a possible way to disconnect Wi-Fi due to an improper resource release. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07030600; Issue ID: ALPS07030600.", "id": "GSD-2022-32589", "modified": "2023-12-13T01:19:12.139982Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "security@mediatek.com", "ID": "CVE-2022-32589", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "MT6761, MT6762, MT6765, MT6768, MT6779, MT6781, MT6785, MT6789, MT6833, MT6853, MT6873, MT6875, MT6877, MT6879, MT6883, MT6885, MT6889, MT6891, MT6893, MT6895, MT6983, MT7663, MT7668, MT7902, MT7921, MT8167S, MT8175, MT8183, MT8185, MT8362A, MT8365, MT8385, MT8512A, MT8518, MT8532, MT8667, MT8766, MT8768, MT8786, MT8788, MT8789", "version": { "version_data": [ { "version_value": "Android 11.0, 12.0 and Yocto 3.1, 3.3" } ] } } ] }, "vendor_name": "MediaTek, Inc." } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In Wi-Fi driver, there is a possible way to disconnect Wi-Fi due to an improper resource release. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07030600; Issue ID: ALPS07030600." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Denial of Service" } ] } ] }, "references": { "reference_data": [ { "name": "https://corp.mediatek.com/product-security-bulletin/October-2022", "refsource": "MISC", "url": "https://corp.mediatek.com/product-security-bulletin/October-2022" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:linuxfoundation:yocto:3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:linuxfoundation:yocto:3.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:mediatek:mt8183:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:mediatek:mt7663:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:mediatek:mt7668:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:mediatek:mt7902:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:mediatek:mt7921:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:mediatek:mt8512a:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:mediatek:mt8518:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:mediatek:mt8532:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false }, { "cpe23Uri": "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "security@mediatek.com", "ID": "CVE-2022-32589" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "In Wi-Fi driver, there is a possible way to disconnect Wi-Fi due to an improper resource release. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07030600; Issue ID: ALPS07030600." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-404" } ] } ] }, "references": { "reference_data": [ { "name": "https://corp.mediatek.com/product-security-bulletin/October-2022", "refsource": "MISC", "tags": [ "Vendor Advisory" ], "url": "https://corp.mediatek.com/product-security-bulletin/October-2022" } ] } }, "impact": { "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6 } }, "lastModifiedDate": "2022-10-12T13:49Z", "publishedDate": "2022-10-07T20:15Z" } } }
fkie_cve-2022-32589
Vulnerability from fkie_nvd
Vendor | Product | Version | |
---|---|---|---|
linuxfoundation | yocto | 3.1 | |
linuxfoundation | yocto | 3.3 | |
android | 11.0 | ||
android | 12.0 | ||
mediatek | mt6761 | - | |
mediatek | mt6762 | - | |
mediatek | mt6765 | - | |
mediatek | mt6768 | - | |
mediatek | mt6779 | - | |
mediatek | mt6781 | - | |
mediatek | mt6785 | - | |
mediatek | mt6789 | - | |
mediatek | mt6833 | - | |
mediatek | mt6853 | - | |
mediatek | mt6873 | - | |
mediatek | mt6875 | - | |
mediatek | mt6877 | - | |
mediatek | mt6879 | - | |
mediatek | mt6883 | - | |
mediatek | mt6885 | - | |
mediatek | mt6889 | - | |
mediatek | mt6891 | - | |
mediatek | mt6893 | - | |
mediatek | mt6895 | - | |
mediatek | mt6983 | - | |
mediatek | mt7663 | - | |
mediatek | mt7668 | - | |
mediatek | mt7902 | - | |
mediatek | mt7921 | - | |
mediatek | mt8167s | - | |
mediatek | mt8175 | - | |
mediatek | mt8183 | - | |
mediatek | mt8185 | - | |
mediatek | mt8362a | - | |
mediatek | mt8365 | - | |
mediatek | mt8385 | - | |
mediatek | mt8512a | - | |
mediatek | mt8518 | - | |
mediatek | mt8532 | - | |
mediatek | mt8667 | - | |
mediatek | mt8766 | - | |
mediatek | mt8768 | - | |
mediatek | mt8786 | - | |
mediatek | mt8788 | - | |
mediatek | mt8789 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:linuxfoundation:yocto:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "B2EECB3C-723A-492D-A6D7-6A1A73EDBFDF", "vulnerable": true }, { "criteria": "cpe:2.3:a:linuxfoundation:yocto:3.3:*:*:*:*:*:*:*", "matchCriteriaId": "2385F2C9-3EA1-424B-AB8D-A672BF1CBE56", "vulnerable": true }, { "criteria": "cpe:2.3:o:google:android:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "109DD7FD-3A48-4C3D-8E1A-4433B98E1E64", "vulnerable": true }, { "criteria": "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*", "matchCriteriaId": "F8FB8EE9-FC56-4D5E-AE55-A5967634740C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*", "matchCriteriaId": "F726F486-A86F-4215-AD93-7A07A071844A", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt6762:-:*:*:*:*:*:*:*", "matchCriteriaId": "C445EB80-6021-4E26-B74E-1B4B6910CE48", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*", "matchCriteriaId": "43E779F6-F0A0-4153-9A1D-B715C3A2F80E", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*", "matchCriteriaId": "06CD97E1-8A76-48B4-9780-9698EF5A960F", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt6779:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBA369B8-8E23-492B-82CC-23114E6A5D1C", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*", "matchCriteriaId": "C4EEE021-6B2A-47A0-AC6B-55525A40D718", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt6785:-:*:*:*:*:*:*:*", "matchCriteriaId": "A82E0A4F-072F-474C-B94C-8114ABE05639", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*", "matchCriteriaId": "8B9B0D82-82C1-4A77-A016-329B99C45F49", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*", "matchCriteriaId": "9814939B-F05E-4870-90C0-7C0F6BAAEB39", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*", "matchCriteriaId": "366F1912-756B-443E-9962-224937DD7DFB", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt6873:-:*:*:*:*:*:*:*", "matchCriteriaId": "F6B8A36E-C5FB-44AE-A1C3-50EBF4C68F6B", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt6875:-:*:*:*:*:*:*:*", "matchCriteriaId": "80BDC5EC-E822-4BC7-8C0D-E8AD8396E8FE", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*", "matchCriteriaId": "7CA9352F-E9BD-4656-9B7C-4AFEE2C78E58", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*", "matchCriteriaId": "704BE5CE-AE08-4432-A8B0-4C8BD62148AD", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*", "matchCriteriaId": "15E2EC3F-9FB3-488B-B1C1-2793A416C755", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD64413C-C774-4C4F-9551-89E1AA9469EE", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*", "matchCriteriaId": "3B787DC3-8E5A-4968-B20B-37B6257FAAE2", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt6891:-:*:*:*:*:*:*:*", "matchCriteriaId": "D8E91CA4-CA5B-40D1-9A96-2B875104BCF4", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*", "matchCriteriaId": "213B5C7F-D965-4312-9CDF-4F06FA77D401", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*", "matchCriteriaId": "E0CA45C9-7BFE-4C93-B2AF-B86501F763AB", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB6B9A26-F8A1-4322-AA4E-CDF8F7D99000", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt7663:-:*:*:*:*:*:*:*", "matchCriteriaId": "10C79211-F064-499D-914E-0BACD038FBF4", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt7668:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E400AB9-B82A-4449-8789-35112940270F", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt7902:-:*:*:*:*:*:*:*", "matchCriteriaId": "91DEA745-47A8-43F1-A1B2-F53F651A99EF", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt7921:-:*:*:*:*:*:*:*", "matchCriteriaId": "32AFEA0A-FFE2-4EA9-8B51-7E3E75DE65CC", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt8167s:-:*:*:*:*:*:*:*", "matchCriteriaId": "639C5BDE-2E83-427A-BAB7-85EA9348AC68", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt8175:-:*:*:*:*:*:*:*", "matchCriteriaId": "582F1041-CD84-4763-AD6F-E08DD11F689F", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt8183:-:*:*:*:*:*:*:*", "matchCriteriaId": "23F65D7B-31A1-4D94-82E9-254A7A6D7BE1", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt8185:-:*:*:*:*:*:*:*", "matchCriteriaId": "62FDE8E0-FD9F-4D2B-944C-E17F34A09F06", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt8362a:-:*:*:*:*:*:*:*", "matchCriteriaId": "2F16F2B9-D89D-4AB2-B768-CB3B22AEFE11", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt8365:-:*:*:*:*:*:*:*", "matchCriteriaId": "97C76F98-5D8D-4E52-ABAF-CD27C1205B0E", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt8385:-:*:*:*:*:*:*:*", "matchCriteriaId": "299378ED-41CE-4966-99B1-65D2BA1215EF", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt8512a:-:*:*:*:*:*:*:*", "matchCriteriaId": "ABD3F702-DE9F-4481-8098-02A7B83F9868", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt8518:-:*:*:*:*:*:*:*", "matchCriteriaId": "EE5E73E0-EF8D-4659-B447-66474BC05708", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt8532:-:*:*:*:*:*:*:*", "matchCriteriaId": "EE18D5C2-0423-4CE5-86E7-69E7BB131BBF", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt8667:-:*:*:*:*:*:*:*", "matchCriteriaId": "2FE14B46-C1CA-465F-8578-059FA2ED30EB", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt8766:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE45F606-2E75-48BC-9D1B-99D504974CBF", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt8768:-:*:*:*:*:*:*:*", "matchCriteriaId": "1CC6E254-11A9-49CE-83FE-6DAC23E7D7AA", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*", "matchCriteriaId": "9D2D5F91-6AAB-4516-AD01-5C60F58BA4A6", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt8788:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE10C121-F2AD-43D2-8FF9-A6C197858220", "vulnerable": false }, { "criteria": "cpe:2.3:h:mediatek:mt8789:-:*:*:*:*:*:*:*", "matchCriteriaId": "1505AD53-987E-4328-8E1D-F5F1EC12B677", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In Wi-Fi driver, there is a possible way to disconnect Wi-Fi due to an improper resource release. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07030600; Issue ID: ALPS07030600." }, { "lang": "es", "value": "En Wi-Fi driver, se presenta una posible forma de desconectar el Wi-Fi debido a una liberaci\u00f3n inapropiada de recursos. Esto podr\u00eda conllevar a una denegaci\u00f3n de servicio remota sin necesidad de privilegios de ejecuci\u00f3n adicionales. No es requerida una interacci\u00f3n del usuario para su explotaci\u00f3n. ID de parche: ALPS07030600; ID de incidencia: ALPS07030600" } ], "id": "CVE-2022-32589", "lastModified": "2024-11-21T07:06:41.423", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-10-07T20:15:14.687", "references": [ { "source": "security@mediatek.com", "tags": [ "Vendor Advisory" ], "url": "https://corp.mediatek.com/product-security-bulletin/October-2022" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://corp.mediatek.com/product-security-bulletin/October-2022" } ], "sourceIdentifier": "security@mediatek.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-404" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
cnvd-2022-87962
Vulnerability from cnvd
Title: 多款MediaTek芯片拒绝服务漏洞
Description:
联发科技股份有限公司(MediaTek Inc.)是全球第四大晶圆厂半导体公司,在移动终端、智能家居应用、无线连接技术及物联网产品等市场位居领先地位,一年约有15亿台内建MediaTek芯片的终端产品在全球各地上市。
多款MediaTek芯片存在拒绝服务漏洞,该漏洞源于Wi-Fi驱动程序中的资源释放不当,攻击者可利用该漏洞导致远程拒绝服务。
Severity: 高
Patch Name: 多款MediaTek芯片拒绝服务漏洞的补丁
Patch Description:
联发科技股份有限公司(MediaTek Inc.)是全球第四大晶圆厂半导体公司,在移动终端、智能家居应用、无线连接技术及物联网产品等市场位居领先地位,一年约有15亿台内建MediaTek芯片的终端产品在全球各地上市。
多款MediaTek芯片存在拒绝服务漏洞,该漏洞源于Wi-Fi驱动程序中的资源释放不当,攻击者可利用该漏洞导致远程拒绝服务。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description:
目前厂商已发布升级补丁以修复漏洞,补丁获取链接: https://corp.mediatek.com/product-security-bulletin/October-2022
Reference: https://corp.mediatek.com/product-security-bulletin/October-2022
Name | ['MediaTek MT6789 Android 11.0', 'MediaTek MT6833 Android 11.0', 'MediaTek MT6853 Android 11.0', 'MediaTek MT6873 Android 11.0', 'MediaTek MT6875 Android 11.0', 'MediaTek MT6877 Android 11.0', 'MediaTek MT6883 Android 11.0', 'MediaTek MT6885 Android 11.0', 'MediaTek MT6889 Android 11.0', 'MediaTek MT6891 Android 11.0', 'MediaTek MT6893 Android 11.0', 'MediaTek MT6983 Android 11.0', 'MediaTek MT6781 Android 12.0', 'MediaTek MT6781 Android 11.0', 'MediaTek MT6785 Android 12.0', 'MediaTek MT6785 Android 11.0', 'MediaTek MT6833 Android 12.0', 'MediaTek MT6877 Android 12.0', 'MediaTek MT6879 Android 12.0', 'MediaTek MT6879 Android 11.0', 'MediaTek MT6893 Android 12.0', 'MediaTek MT6983 Android 12.0', 'MediaTek MT6853 Android 12.0', 'MediaTek MT6873 Android 12.0', 'MediaTek MT6883 Android 12.0', 'MediaTek MT6885 Android 12.0', 'MediaTek MT6889 Android 12.0', 'MediaTek MT6895 Android 12.0', 'MediaTek MT6895 Android 11.0', 'MediaTek MT6761 Android 12.0', 'MediaTek MT6761 Android 11.0', 'MediaTek MT6765 Android 12.0', 'MediaTek MT6765 Android 11.0', 'MediaTek MT6768 Android 12.0', 'MediaTek MT6768 Android 11.0', 'MediaTek MT6779 Android 12.0', 'MediaTek MT6779 Android 11.0', 'MediaTek MT6875 Android 12.0', 'MediaTek MT8183 Android 12.0', 'MediaTek MT8183 Android 11.0', 'MediaTek MT8365 Android 12.0', 'MediaTek MT8365 Android 11.0', 'MediaTek MT8385 Android 12.0', 'MediaTek MT8385 Android 11.0', 'MediaTek MT8768 Android 12.0', 'MediaTek MT8768 Android 11.0', 'MediaTek MT8786 Android 12.0', 'MediaTek MT8786 Android 11.0', 'MediaTek MT8788 Android 12.0', 'MediaTek MT8788 Android 11.0', 'MediaTek MT8167S Android 12.0', 'MediaTek MT8167S Android 11.0', 'MediaTek MT8175 Android 12.0', 'MediaTek MT8175 Android 11.0', 'MediaTek MT8185 Android 12.0', 'MediaTek MT8185 Android 11.0', 'MediaTek MT8362A Android 12.0', 'MediaTek MT8362A Android 11.0', 'MediaTek MT8667 Android 12.0', 'MediaTek MT8667 Android 11.0', 'MediaTek MT8766 Android 12.0', 'MediaTek MT8766 Android 11.0', 'MediaTek MT6761 Yocto 3.1', 'MediaTek MT6761 Yocto 3.3', 'MediaTek MT6762 Android 11.0', 'MediaTek MT6762 Android 12.0', 'MediaTek MT6762 Yocto 3.1', 'MediaTek MT6762 Yocto 3.3', 'MediaTek MT6765 Yocto 3.1', 'MediaTek MT6765 Yocto 3.3', 'MediaTek MT6768 Yocto 3.1', 'MediaTek MT6768 Yocto 3.3', 'MediaTek MT6779 Yocto 3.1', 'MediaTek MT6779 Yocto 3.3', 'MediaTek MT6781 Yocto 3.1', 'MediaTek MT6781 Yocto 3.3', 'MediaTek MT6785 Yocto 3.1', 'MediaTek MT6785 Yocto 3.3', 'MediaTek MT6789 Android 12.0', 'MediaTek MT6789 Yocto 3.1', 'MediaTek MT6789 Yocto 3.3', 'MediaTek MT6853 Yocto 3.1', 'MediaTek MT6853 Yocto 3.3', 'MediaTek MT6873 Yocto 3.1', 'MediaTek MT6873 Yocto 3.3', 'MediaTek MT6875 Yocto 3.1', 'MediaTek MT6875 Yocto 3.3', 'MediaTek MT6879 Yocto 3.1', 'MediaTek MT6879 Yocto 3.3', 'MediaTek MT6883 Yocto 3.1', 'MediaTek MT6883 Yocto 3.3', 'MediaTek MT6885 Yocto 3.1', 'MediaTek MT6885 Yocto 3.3', 'MediaTek MT6889 Yocto 3.1', 'MediaTek MT6889 Yocto 3.3', 'MediaTek MT6895 Yocto 3.1', 'MediaTek MT6895 Yocto 3.3', 'MediaTek MT6983 Yocto 3.1', 'MediaTek MT6983 Yocto 3.3', 'MediaTek MT7663 Android 11.0', 'MediaTek MT7663 Android 12.0', 'MediaTek MT7663 Yocto 3.1', 'MediaTek MT7663 Yocto 3.3', 'MediaTek MT7902 Android 11.0', 'MediaTek MT7902 Android 12.0', 'MediaTek MT7902 Yocto 3.1', 'MediaTek MT7902 Yocto 3.3', 'MediaTek MT7921 Android 11.0', 'MediaTek MT7921 Android 12.0', 'MediaTek MT7921 Yocto 3.1', 'MediaTek MT7921 Yocto 3.3', 'MediaTek MT8167S Yocto 3.1', 'MediaTek MT8167S Yocto 3.3', 'MediaTek MT8175 Yocto 3.1', 'MediaTek MT8175 Yocto 3.3', 'MediaTek MT8183 Yocto 3.1', 'MediaTek MT8183 Yocto 3.3', 'MediaTek MT8185 Yocto 3.1', 'MediaTek MT8185 Yocto 3.3', 'MediaTek MT8362A Yocto 3.1', 'MediaTek MT8362A Yocto 3.3', 'MediaTek MT8365 Yocto 3.1', 'MediaTek MT8365 Yocto 3.3', 'MediaTek MT8385 Yocto 3.1', 'MediaTek MT8385 Yocto 3.3', 'MediaTek MT8512A Android 11.0', 'MediaTek MT8512A Android 12.0', 'MediaTek MT8512A Yocto 3.1', 'MediaTek MT8512A Yocto 3.3', 'MediaTek MT8518 Android 11.0', 'MediaTek MT8518 Android 12.0', 'MediaTek MT8518 Yocto 3.1', 'MediaTek MT8518 Yocto 3.3', 'MediaTek MT8532 Android 11.0', 'MediaTek MT8532 Android 12.0', 'MediaTek MT8532 Yocto 3.1', 'MediaTek MT8532 Yocto 3.3', 'MediaTek MT8667 Yocto 3.1', 'MediaTek MT8667 Yocto 3.3', 'MediaTek MT8766 Yocto 3.1', 'MediaTek MT8766 Yocto 3.3', 'MediaTek MT8768 Yocto 3.1', 'MediaTek MT8768 Yocto 3.3', 'MediaTek MT8786 Yocto 3.1', 'MediaTek MT8786 Yocto 3.3', 'MediaTek MT8788 Yocto 3.1', 'MediaTek MT8788 Yocto 3.3', 'MediaTek MT8789 Android 11.0', 'MediaTek MT8789 Android 12.0', 'MediaTek MT8789 Yocto 3.1', 'MediaTek MT8789 Yocto 3.3', 'MediaTek MT6833 Yocto 3.1', 'MediaTek MT6833 Yocto 3.3', 'MediaTek MT6877 Yocto 3.1', 'MediaTek MT6877 Yocto 3.3', 'MediaTek MT6891 Android 12.0', 'MediaTek MT6891 Yocto 3.1', 'MediaTek MT6891 Yocto 3.3', 'MediaTek MT6893 Yocto 3.1', 'MediaTek MT6893 Yocto 3.3', 'MediaTek MT7668 Android 11.0', 'MediaTek MT7668 Android 12.0', 'MediaTek MT7668 Yocto 3.1', 'MediaTek MT7668 Yocto 3.3'] |
---|
{ "cves": { "cve": { "cveNumber": "CVE-2022-32589", "cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2022-32589" } }, "description": "\u8054\u53d1\u79d1\u6280\u80a1\u4efd\u6709\u9650\u516c\u53f8\uff08MediaTek Inc.\uff09\u662f\u5168\u7403\u7b2c\u56db\u5927\u6676\u5706\u5382\u534a\u5bfc\u4f53\u516c\u53f8\uff0c\u5728\u79fb\u52a8\u7ec8\u7aef\u3001\u667a\u80fd\u5bb6\u5c45\u5e94\u7528\u3001\u65e0\u7ebf\u8fde\u63a5\u6280\u672f\u53ca\u7269\u8054\u7f51\u4ea7\u54c1\u7b49\u5e02\u573a\u4f4d\u5c45\u9886\u5148\u5730\u4f4d\uff0c\u4e00\u5e74\u7ea6\u670915\u4ebf\u53f0\u5185\u5efaMediaTek\u82af\u7247\u7684\u7ec8\u7aef\u4ea7\u54c1\u5728\u5168\u7403\u5404\u5730\u4e0a\u5e02\u3002\n\n\u591a\u6b3eMediaTek\u82af\u7247\u5b58\u5728\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8eWi-Fi\u9a71\u52a8\u7a0b\u5e8f\u4e2d\u7684\u8d44\u6e90\u91ca\u653e\u4e0d\u5f53\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5bfc\u81f4\u8fdc\u7a0b\u62d2\u7edd\u670d\u52a1\u3002", "formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u53d1\u5e03\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u6f0f\u6d1e\uff0c\u8865\u4e01\u83b7\u53d6\u94fe\u63a5\uff1a\r\nhttps://corp.mediatek.com/product-security-bulletin/October-2022", "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e", "number": "CNVD-2022-87962", "openTime": "2022-12-15", "patchDescription": "\u8054\u53d1\u79d1\u6280\u80a1\u4efd\u6709\u9650\u516c\u53f8\uff08MediaTek Inc.\uff09\u662f\u5168\u7403\u7b2c\u56db\u5927\u6676\u5706\u5382\u534a\u5bfc\u4f53\u516c\u53f8\uff0c\u5728\u79fb\u52a8\u7ec8\u7aef\u3001\u667a\u80fd\u5bb6\u5c45\u5e94\u7528\u3001\u65e0\u7ebf\u8fde\u63a5\u6280\u672f\u53ca\u7269\u8054\u7f51\u4ea7\u54c1\u7b49\u5e02\u573a\u4f4d\u5c45\u9886\u5148\u5730\u4f4d\uff0c\u4e00\u5e74\u7ea6\u670915\u4ebf\u53f0\u5185\u5efaMediaTek\u82af\u7247\u7684\u7ec8\u7aef\u4ea7\u54c1\u5728\u5168\u7403\u5404\u5730\u4e0a\u5e02\u3002\r\n\r\n\u591a\u6b3eMediaTek\u82af\u7247\u5b58\u5728\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8eWi-Fi\u9a71\u52a8\u7a0b\u5e8f\u4e2d\u7684\u8d44\u6e90\u91ca\u653e\u4e0d\u5f53\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5bfc\u81f4\u8fdc\u7a0b\u62d2\u7edd\u670d\u52a1\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002", "patchName": "\u591a\u6b3eMediaTek\u82af\u7247\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\u7684\u8865\u4e01", "products": { "product": [ "MediaTek MT6789 Android 11.0", "MediaTek MT6833 Android 11.0", "MediaTek MT6853 Android 11.0", "MediaTek MT6873 Android 11.0", "MediaTek MT6875 Android 11.0", "MediaTek MT6877 Android 11.0", "MediaTek MT6883 Android 11.0", "MediaTek MT6885 Android 11.0", "MediaTek MT6889 Android 11.0", "MediaTek MT6891 Android 11.0", "MediaTek MT6893 Android 11.0", "MediaTek MT6983 Android 11.0", "MediaTek MT6781 Android 12.0", "MediaTek MT6781 Android 11.0", "MediaTek MT6785 Android 12.0", "MediaTek MT6785 Android 11.0", "MediaTek MT6833 Android 12.0", "MediaTek MT6877 Android 12.0", "MediaTek MT6879 Android 12.0", "MediaTek MT6879 Android 11.0", "MediaTek MT6893 Android 12.0", "MediaTek MT6983 Android 12.0", "MediaTek MT6853 Android 12.0", "MediaTek MT6873 Android 12.0", "MediaTek MT6883 Android 12.0", "MediaTek MT6885 Android 12.0", "MediaTek MT6889 Android 12.0", "MediaTek MT6895 Android 12.0", "MediaTek MT6895 Android 11.0", "MediaTek MT6761 Android 12.0", "MediaTek MT6761 Android 11.0", "MediaTek MT6765 Android 12.0", "MediaTek MT6765 Android 11.0", "MediaTek MT6768 Android 12.0", "MediaTek MT6768 Android 11.0", "MediaTek MT6779 Android 12.0", "MediaTek MT6779 Android 11.0", "MediaTek MT6875 Android 12.0", "MediaTek MT8183 Android 12.0", "MediaTek MT8183 Android 11.0", "MediaTek MT8365 Android 12.0", "MediaTek MT8365 Android 11.0", "MediaTek MT8385 Android 12.0", "MediaTek MT8385 Android 11.0", "MediaTek MT8768 Android 12.0", "MediaTek MT8768 Android 11.0", "MediaTek MT8786 Android 12.0", "MediaTek MT8786 Android 11.0", "MediaTek MT8788 Android 12.0", "MediaTek MT8788 Android 11.0", "MediaTek MT8167S Android 12.0", "MediaTek MT8167S Android 11.0", "MediaTek MT8175 Android 12.0", "MediaTek MT8175 Android 11.0", "MediaTek MT8185 Android 12.0", "MediaTek MT8185 Android 11.0", "MediaTek MT8362A Android 12.0", "MediaTek MT8362A Android 11.0", "MediaTek MT8667 Android 12.0", "MediaTek MT8667 Android 11.0", "MediaTek MT8766 Android 12.0", "MediaTek MT8766 Android 11.0", "MediaTek MT6761 Yocto 3.1", "MediaTek MT6761 Yocto 3.3", "MediaTek MT6762 Android 11.0", "MediaTek MT6762 Android 12.0", "MediaTek MT6762 Yocto 3.1", "MediaTek MT6762 Yocto 3.3", "MediaTek MT6765 Yocto 3.1", "MediaTek MT6765 Yocto 3.3", "MediaTek MT6768 Yocto 3.1", "MediaTek MT6768 Yocto 3.3", "MediaTek MT6779 Yocto 3.1", "MediaTek MT6779 Yocto 3.3", "MediaTek MT6781 Yocto 3.1", "MediaTek MT6781 Yocto 3.3", "MediaTek MT6785 Yocto 3.1", "MediaTek MT6785 Yocto 3.3", "MediaTek MT6789 Android 12.0", "MediaTek MT6789 Yocto 3.1", "MediaTek MT6789 Yocto 3.3", "MediaTek MT6853 Yocto 3.1", "MediaTek MT6853 Yocto 3.3", "MediaTek MT6873 Yocto 3.1", "MediaTek MT6873 Yocto 3.3", "MediaTek MT6875 Yocto 3.1", "MediaTek MT6875 Yocto 3.3", "MediaTek MT6879 Yocto 3.1", "MediaTek MT6879 Yocto 3.3", "MediaTek MT6883 Yocto 3.1", "MediaTek MT6883 Yocto 3.3", "MediaTek MT6885 Yocto 3.1", "MediaTek MT6885 Yocto 3.3", "MediaTek MT6889 Yocto 3.1", "MediaTek MT6889 Yocto 3.3", "MediaTek MT6895 Yocto 3.1", "MediaTek MT6895 Yocto 3.3", "MediaTek MT6983 Yocto 3.1", "MediaTek MT6983 Yocto 3.3", "MediaTek MT7663 Android 11.0", "MediaTek MT7663 Android 12.0", "MediaTek MT7663 Yocto 3.1", "MediaTek MT7663 Yocto 3.3", "MediaTek MT7902 Android 11.0", "MediaTek MT7902 Android 12.0", "MediaTek MT7902 Yocto 3.1", "MediaTek MT7902 Yocto 3.3", "MediaTek MT7921 Android 11.0", "MediaTek MT7921 Android 12.0", "MediaTek MT7921 Yocto 3.1", "MediaTek MT7921 Yocto 3.3", "MediaTek MT8167S Yocto 3.1", "MediaTek MT8167S Yocto 3.3", "MediaTek MT8175 Yocto 3.1", "MediaTek MT8175 Yocto 3.3", "MediaTek MT8183 Yocto 3.1", "MediaTek MT8183 Yocto 3.3", "MediaTek MT8185 Yocto 3.1", "MediaTek MT8185 Yocto 3.3", "MediaTek MT8362A Yocto 3.1", "MediaTek MT8362A Yocto 3.3", "MediaTek MT8365 Yocto 3.1", "MediaTek MT8365 Yocto 3.3", "MediaTek MT8385 Yocto 3.1", "MediaTek MT8385 Yocto 3.3", "MediaTek MT8512A Android 11.0", "MediaTek MT8512A Android 12.0", "MediaTek MT8512A Yocto 3.1", "MediaTek MT8512A Yocto 3.3", "MediaTek MT8518 Android 11.0", "MediaTek MT8518 Android 12.0", "MediaTek MT8518 Yocto 3.1", "MediaTek MT8518 Yocto 3.3", "MediaTek MT8532 Android 11.0", "MediaTek MT8532 Android 12.0", "MediaTek MT8532 Yocto 3.1", "MediaTek MT8532 Yocto 3.3", "MediaTek MT8667 Yocto 3.1", "MediaTek MT8667 Yocto 3.3", "MediaTek MT8766 Yocto 3.1", "MediaTek MT8766 Yocto 3.3", "MediaTek MT8768 Yocto 3.1", "MediaTek MT8768 Yocto 3.3", "MediaTek MT8786 Yocto 3.1", "MediaTek MT8786 Yocto 3.3", "MediaTek MT8788 Yocto 3.1", "MediaTek MT8788 Yocto 3.3", "MediaTek MT8789 Android 11.0", "MediaTek MT8789 Android 12.0", "MediaTek MT8789 Yocto 3.1", "MediaTek MT8789 Yocto 3.3", "MediaTek MT6833 Yocto 3.1", "MediaTek MT6833 Yocto 3.3", "MediaTek MT6877 Yocto 3.1", "MediaTek MT6877 Yocto 3.3", "MediaTek MT6891 Android 12.0", "MediaTek MT6891 Yocto 3.1", "MediaTek MT6891 Yocto 3.3", "MediaTek MT6893 Yocto 3.1", "MediaTek MT6893 Yocto 3.3", "MediaTek MT7668 Android 11.0", "MediaTek MT7668 Android 12.0", "MediaTek MT7668 Yocto 3.1", "MediaTek MT7668 Yocto 3.3" ] }, "referenceLink": "https://corp.mediatek.com/product-security-bulletin/October-2022", "serverity": "\u9ad8", "submitTime": "2022-10-10", "title": "\u591a\u6b3eMediaTek\u82af\u7247\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e" }
var-202210-0338
Vulnerability from variot
In Wi-Fi driver, there is a possible way to disconnect Wi-Fi due to an improper resource release. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07030600; Issue ID: ALPS07030600. Linux Foundation of yocto Products from several other vendors contain vulnerabilities related to improper shutdown and release of resources.Service operation interruption (DoS) It may be in a state. MediaTek Inc. is the world's fourth-largest foundry semiconductor company. It is in a leading position in the markets of mobile terminals, smart home applications, wireless connection technology and Internet of Things products, with approximately 1.5 billion units a year End products with built-in MediaTek chips are available all over the world
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202210-0338", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "android", "scope": "eq", "trust": 1.0, "vendor": "google", "version": "12.0" }, { "model": "yocto", "scope": "eq", "trust": 1.0, "vendor": "linuxfoundation", "version": "3.3" }, { "model": "android", "scope": "eq", "trust": 1.0, "vendor": "google", "version": "11.0" }, { "model": "yocto", "scope": "eq", "trust": 1.0, "vendor": "linuxfoundation", "version": "3.1" }, { "model": "android", "scope": null, "trust": 0.8, "vendor": "google", "version": null }, { "model": "yocto", "scope": null, "trust": 0.8, "vendor": "linux", "version": null }, { "model": "mt6789 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "11.0" }, { "model": "mt6833 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "11.0" }, { "model": "mt6853 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "11.0" }, { "model": "mt6873 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "11.0" }, { "model": "mt6875 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "11.0" }, { "model": "mt6877 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "11.0" }, { "model": "mt6883 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "11.0" }, { "model": "mt6885 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "11.0" }, { "model": "mt6889 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "11.0" }, { "model": "mt6891 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "11.0" }, { "model": "mt6893 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "11.0" }, { "model": "mt6983 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "11.0" }, { "model": "mt6781 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "12.0" }, { "model": "mt6781 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "11.0" }, { "model": "mt6785 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "12.0" }, { "model": "mt6785 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "11.0" }, { "model": "mt6833 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "12.0" }, { "model": "mt6877 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "12.0" }, { "model": "mt6879 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "12.0" }, { "model": "mt6879 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "11.0" }, { "model": "mt6893 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "12.0" }, { "model": "mt6983 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "12.0" }, { "model": "mt6853 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "12.0" }, { "model": "mt6873 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "12.0" }, { "model": "mt6883 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "12.0" }, { "model": "mt6885 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "12.0" }, { "model": "mt6889 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "12.0" }, { "model": "mt6895 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "12.0" }, { "model": "mt6895 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "11.0" }, { "model": "mt6761 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "12.0" }, { "model": "mt6761 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "11.0" }, { "model": "mt6765 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "12.0" }, { "model": "mt6765 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "11.0" }, { "model": "mt6768 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "12.0" }, { "model": "mt6768 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "11.0" }, { "model": "mt6779 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "12.0" }, { "model": "mt6779 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "11.0" }, { "model": "mt6875 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "12.0" }, { "model": "mt8183 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "12.0" }, { "model": "mt8183 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "11.0" }, { "model": "mt8365 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "12.0" }, { "model": "mt8365 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "11.0" }, { "model": "mt8385 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "12.0" }, { "model": "mt8385 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "11.0" }, { "model": "mt8768 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "12.0" }, { "model": "mt8768 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "11.0" }, { "model": "mt8786 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "12.0" }, { "model": "mt8786 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "11.0" }, { "model": "mt8788 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "12.0" }, { "model": "mt8788 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "11.0" }, { "model": "mt8167s android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "12.0" }, { "model": "mt8167s android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "11.0" }, { "model": "mt8175 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "12.0" }, { "model": "mt8175 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "11.0" }, { "model": "mt8185 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "12.0" }, { "model": "mt8185 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "11.0" }, { "model": "mt8362a android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "12.0" }, { "model": "mt8362a android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "11.0" }, { "model": "mt8667 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "12.0" }, { "model": "mt8667 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "11.0" }, { "model": "mt8766 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "12.0" }, { "model": "mt8766 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "11.0" }, { "model": "mt6761 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.1" }, { "model": "mt6761 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.3" }, { "model": "mt6762 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "11.0" }, { "model": "mt6762 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "12.0" }, { "model": "mt6762 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.1" }, { "model": "mt6762 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.3" }, { "model": "mt6765 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.1" }, { "model": "mt6765 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.3" }, { "model": "mt6768 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.1" }, { "model": "mt6768 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.3" }, { "model": "mt6779 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.1" }, { "model": "mt6779 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.3" }, { "model": "mt6781 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.1" }, { "model": "mt6781 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.3" }, { "model": "mt6785 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.1" }, { "model": "mt6785 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.3" }, { "model": "mt6789 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "12.0" }, { "model": "mt6789 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.1" }, { "model": "mt6789 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.3" }, { "model": "mt6853 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.1" }, { "model": "mt6853 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.3" }, { "model": "mt6873 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.1" }, { "model": "mt6873 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.3" }, { "model": "mt6875 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.1" }, { "model": "mt6875 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.3" }, { "model": "mt6879 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.1" }, { "model": "mt6879 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.3" }, { "model": "mt6883 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.1" }, { "model": "mt6883 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.3" }, { "model": "mt6885 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.1" }, { "model": "mt6885 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.3" }, { "model": "mt6889 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.1" }, { "model": "mt6889 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.3" }, { "model": "mt6895 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.1" }, { "model": "mt6895 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.3" }, { "model": "mt6983 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.1" }, { "model": "mt6983 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.3" }, { "model": "mt7663 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "11.0" }, { "model": "mt7663 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "12.0" }, { "model": "mt7663 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.1" }, { "model": "mt7663 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.3" }, { "model": "mt7902 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "11.0" }, { "model": "mt7902 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "12.0" }, { "model": "mt7902 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.1" }, { "model": "mt7902 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.3" }, { "model": "mt7921 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "11.0" }, { "model": "mt7921 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "12.0" }, { "model": "mt7921 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.1" }, { "model": "mt7921 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.3" }, { "model": "mt8167s yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.1" }, { "model": "mt8167s yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.3" }, { "model": "mt8175 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.1" }, { "model": "mt8175 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.3" }, { "model": "mt8183 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.1" }, { "model": "mt8183 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.3" }, { "model": "mt8185 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.1" }, { "model": "mt8185 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.3" }, { "model": "mt8362a yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.1" }, { "model": "mt8362a yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.3" }, { "model": "mt8365 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.1" }, { "model": "mt8365 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.3" }, { "model": "mt8385 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.1" }, { "model": "mt8385 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.3" }, { "model": "mt8512a android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "11.0" }, { "model": "mt8512a android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "12.0" }, { "model": "mt8512a yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.1" }, { "model": "mt8512a yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.3" }, { "model": "mt8518 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "11.0" }, { "model": "mt8518 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "12.0" }, { "model": "mt8518 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.1" }, { "model": "mt8518 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.3" }, { "model": "mt8532 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "11.0" }, { "model": "mt8532 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "12.0" }, { "model": "mt8532 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.1" }, { "model": "mt8532 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.3" }, { "model": "mt8667 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.1" }, { "model": "mt8667 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.3" }, { "model": "mt8766 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.1" }, { "model": "mt8766 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.3" }, { "model": "mt8768 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.1" }, { "model": "mt8768 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.3" }, { "model": "mt8786 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.1" }, { "model": "mt8786 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.3" }, { "model": "mt8788 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.1" }, { "model": "mt8788 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.3" }, { "model": "mt8789 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "11.0" }, { "model": "mt8789 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "12.0" }, { "model": "mt8789 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.1" }, { "model": "mt8789 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.3" }, { "model": "mt6833 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.1" }, { "model": "mt6833 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.3" }, { "model": "mt6877 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.1" }, { "model": "mt6877 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.3" }, { "model": "mt6891 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "12.0" }, { "model": "mt6891 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.1" }, { "model": "mt6891 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.3" }, { "model": "mt6893 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.1" }, { "model": "mt6893 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.3" }, { "model": "mt7668 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "11.0" }, { "model": "mt7668 android", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "12.0" }, { "model": "mt7668 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.1" }, { "model": "mt7668 yocto", "scope": "eq", "trust": 0.6, "vendor": "mediatek", "version": "3.3" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-87962" }, { "db": "JVNDB", "id": "JVNDB-2022-018869" }, { "db": "NVD", "id": "CVE-2022-32589" } ] }, "cve": "CVE-2022-32589", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2022-87962", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "HIGH", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "id": "CVE-2022-32589", "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2022-32589", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-32589", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2022-32589", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2022-87962", "trust": 0.6, "value": "HIGH" }, { "author": "CNNVD", "id": "CNNVD-202210-343", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-87962" }, { "db": "JVNDB", "id": "JVNDB-2022-018869" }, { "db": "CNNVD", "id": "CNNVD-202210-343" }, { "db": "NVD", "id": "CVE-2022-32589" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "In Wi-Fi driver, there is a possible way to disconnect Wi-Fi due to an improper resource release. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07030600; Issue ID: ALPS07030600. Linux Foundation of yocto Products from several other vendors contain vulnerabilities related to improper shutdown and release of resources.Service operation interruption (DoS) It may be in a state. MediaTek Inc. is the world\u0027s fourth-largest foundry semiconductor company. It is in a leading position in the markets of mobile terminals, smart home applications, wireless connection technology and Internet of Things products, with approximately 1.5 billion units a year End products with built-in MediaTek chips are available all over the world", "sources": [ { "db": "NVD", "id": "CVE-2022-32589" }, { "db": "JVNDB", "id": "JVNDB-2022-018869" }, { "db": "CNVD", "id": "CNVD-2022-87962" } ], "trust": 2.16 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-32589", "trust": 3.8 }, { "db": "JVNDB", "id": "JVNDB-2022-018869", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2022-87962", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202210-343", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-87962" }, { "db": "JVNDB", "id": "JVNDB-2022-018869" }, { "db": "CNNVD", "id": "CNNVD-202210-343" }, { "db": "NVD", "id": "CVE-2022-32589" } ] }, "id": "VAR-202210-0338", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2022-87962" } ], "trust": 1.6 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "IoT" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-87962" } ] }, "last_update_date": "2024-08-14T15:00:44.999000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Patch for Multiple MediaTek Chip Denial of Service Vulnerabilities", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/372266" }, { "title": "MediaTek Fixes for chip security vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=209982" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-87962" }, { "db": "CNNVD", "id": "CNNVD-202210-343" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-404", "trust": 1.0 }, { "problemtype": "Improper shutdown and release of resources (CWE-404) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018869" }, { "db": "NVD", "id": "CVE-2022-32589" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 3.0, "url": "https://corp.mediatek.com/product-security-bulletin/october-2022" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-32589" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-32589/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2022-87962" }, { "db": "JVNDB", "id": "JVNDB-2022-018869" }, { "db": "CNNVD", "id": "CNNVD-202210-343" }, { "db": "NVD", "id": "CVE-2022-32589" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2022-87962" }, { "db": "JVNDB", "id": "JVNDB-2022-018869" }, { "db": "CNNVD", "id": "CNNVD-202210-343" }, { "db": "NVD", "id": "CVE-2022-32589" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-15T00:00:00", "db": "CNVD", "id": "CNVD-2022-87962" }, { "date": "2023-10-23T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-018869" }, { "date": "2022-10-07T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-343" }, { "date": "2022-10-07T20:15:14.687000", "db": "NVD", "id": "CVE-2022-32589" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-12-15T00:00:00", "db": "CNVD", "id": "CNVD-2022-87962" }, { "date": "2023-10-23T08:14:00", "db": "JVNDB", "id": "JVNDB-2022-018869" }, { "date": "2022-10-13T00:00:00", "db": "CNNVD", "id": "CNNVD-202210-343" }, { "date": "2022-10-12T13:49:09.127000", "db": "NVD", "id": "CVE-2022-32589" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-343" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Linux\u00a0Foundation\u00a0 of \u00a0yocto\u00a0 Improper resource shutdown and release vulnerabilities in products from multiple other vendors", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018869" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202210-343" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.