Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Yocto
(Linuxfoundation)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 73 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2023-06-06 | CVE-2023-20736 | In vcu, there is a possible out of bounds write due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07645149; Issue ID: ALPS07645189. | Android, Iot\-Yocto, Yocto | 6.4 | ||
2023-06-06 | CVE-2023-20740 | In vcu, there is a possible memory corruption due to a logic error. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07559819; Issue ID: ALPS07559840. | Android, Iot\-Yocto, Yocto | 6.7 | ||
2023-06-06 | CVE-2023-20743 | In vcu, there is a possible out of bounds write due to improper locking. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07519142; Issue ID: ALPS07519142. | Android, Iot\-Yocto, Yocto | 6.7 | ||
2023-06-06 | CVE-2023-20747 | In vcu, there is a possible memory corruption due to type confusion. This could lead to local denial of service with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07519103; Issue ID: ALPS07519121. | Android, Iot\-Yocto, Yocto | 4.4 | ||
2023-06-06 | CVE-2023-20744 | In vcu, there is a possible use after free due to a logic error. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07519142; Issue ID: ALPS07519200. | Android, Iot\-Yocto, Yocto | 6.7 | ||
2023-06-06 | CVE-2023-20745 | In vcu, there is a possible out of bounds write due to improper locking. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07519142; Issue ID: ALPS07560694. | Android, Iot\-Yocto, Yocto | 6.7 | ||
2023-06-06 | CVE-2023-20746 | In vcu, there is a possible out of bounds write due to improper locking. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07519142; Issue ID: ALPS07519217. | Android, Iot\-Yocto, Yocto | 6.7 | ||
2023-05-15 | CVE-2023-20726 | In mnld, there is a possible leak of GPS location due to a missing permission check. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07735968 / ALPS07884552 (For MT6880, MT6890, MT6980, MT6980D and MT6990 only); Issue ID: ALPS07735968 / ALPS07884552 (For MT6880, MT6890, MT6980, MT6980D and MT6990 only). | Android, Yocto, Openwrt, Rdkb | 3.3 | ||
2022-10-07 | CVE-2022-32589 | In Wi-Fi driver, there is a possible way to disconnect Wi-Fi due to an improper resource release. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07030600; Issue ID: ALPS07030600. | Android, Yocto | 7.5 | ||
2022-10-07 | CVE-2022-32592 | In cpu dvfs, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07139405; Issue ID: ALPS07139405. | Android, Yocto | 6.7 |