
CVE-2022-32640
https://notcve.org/view.php?id=CVE-2022-32640
03 Jan 2023 — In meta wifi, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07441652; Issue ID: ALPS07441652. • https://corp.mediatek.com/product-security-bulletin/January-2023 • CWE-787: Out-of-bounds Write •

CVE-2022-32638
https://notcve.org/view.php?id=CVE-2022-32638
03 Jan 2023 — In isp, there is a possible out of bounds write due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07494449; Issue ID: ALPS07494449. En isp, existe una posible escritura fuera de los límites debido a una condición de ejecución. • https://corp.mediatek.com/product-security-bulletin/January-2023 • CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition •

CVE-2022-32644
https://notcve.org/view.php?id=CVE-2022-32644
03 Jan 2023 — In vow, there is a possible use after free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07494473; Issue ID: ALPS07494473. En voto, existe un posible use after free debido a una condición de ejecución. • https://corp.mediatek.com/product-security-bulletin/January-2023 • CWE-662: Improper Synchronization •

CVE-2022-32641
https://notcve.org/view.php?id=CVE-2022-32641
03 Jan 2023 — In meta wifi, there is a possible out of bounds read due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07453594; Issue ID: ALPS07453594. • https://corp.mediatek.com/product-security-bulletin/January-2023 • CWE-125: Out-of-bounds Read •

CVE-2022-32639
https://notcve.org/view.php?id=CVE-2022-32639
03 Jan 2023 — In watchdog, there is a possible out of bounds read due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07494487; Issue ID: ALPS07494487. • https://corp.mediatek.com/product-security-bulletin/January-2023 • CWE-125: Out-of-bounds Read •

CVE-2022-32646
https://notcve.org/view.php?id=CVE-2022-32646
03 Jan 2023 — In gpu drm, there is a possible stack overflow due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07363501; Issue ID: ALPS07363501. • https://corp.mediatek.com/product-security-bulletin/January-2023 • CWE-787: Out-of-bounds Write •

CVE-2022-32653
https://notcve.org/view.php?id=CVE-2022-32653
03 Jan 2023 — In mtk-aie, there is a possible use after free due to a logic error. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07262518; Issue ID: ALPS07262518. En mtk-aie, existe un posible use after free debido a un error lógico. • https://corp.mediatek.com/product-security-bulletin/January-2023 • CWE-20: Improper Input Validation •

CVE-2022-32649
https://notcve.org/view.php?id=CVE-2022-32649
03 Jan 2023 — In jpeg, there is a possible use after free due to a logic error. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07225840; Issue ID: ALPS07225840. En jpeg, existe un posible use after free debido a un error lógico. • https://corp.mediatek.com/product-security-bulletin/January-2023 • CWE-131: Incorrect Calculation of Buffer Size •

CVE-2022-32645
https://notcve.org/view.php?id=CVE-2022-32645
03 Jan 2023 — In vow, there is a possible information disclosure due to a race condition. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07494477; Issue ID: ALPS07494477. • https://corp.mediatek.com/product-security-bulletin/January-2023 • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') CWE-662: Improper Synchronization •

CVE-2022-32650
https://notcve.org/view.php?id=CVE-2022-32650
03 Jan 2023 — In mtk-isp, there is a possible use after free due to a logic error. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07225853; Issue ID: ALPS07225853. En mtk-isp, existe un posible use after free debido a un error lógico. • https://corp.mediatek.com/product-security-bulletin/January-2023 • CWE-131: Incorrect Calculation of Buffer Size •