Product:

Iot\-Yocto

(Linuxfoundation)
Repositories

Unknown:

This might be proprietary software.

#Vulnerabilities 15
Date Id Summary Products Score Patch Annotated
2023-06-06 CVE-2023-20747 In vcu, there is a possible memory corruption due to type confusion. This could lead to local denial of service with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07519103; Issue ID: ALPS07519121. Android, Iot\-Yocto, Yocto 4.4
2023-06-06 CVE-2023-20715 In wlan, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07796900; Issue ID: ALPS07796900. Android, Linux_kernel, Iot\-Yocto, Yocto 6.7
2023-06-06 CVE-2023-20716 In wlan, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07796883; Issue ID: ALPS07796883. Android, Linux_kernel, Iot\-Yocto, Yocto 6.7
2023-06-06 CVE-2023-20746 In vcu, there is a possible out of bounds write due to improper locking. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07519142; Issue ID: ALPS07519217. Android, Iot\-Yocto, Yocto 6.7
2023-06-06 CVE-2023-20745 In vcu, there is a possible out of bounds write due to improper locking. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07519142; Issue ID: ALPS07560694. Android, Iot\-Yocto, Yocto 6.7