Note:
This project will be discontinued after December 13, 2021. [more]
Product:
Iot\-Yocto
(Linuxfoundation)Repositories |
Unknown: This might be proprietary software. |
#Vulnerabilities | 15 |
Date | Id | Summary | Products | Score | Patch | Annotated |
---|---|---|---|---|---|---|
2023-06-06 | CVE-2023-20734 | In vcu, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07645149; Issue ID: ALPS07645184. | Android, Iot\-Yocto, Yocto | 6.7 | ||
2023-06-06 | CVE-2023-20735 | In vcu, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07645149; Issue ID: ALPS07645178. | Android, Iot\-Yocto, Yocto | 6.7 | ||
2023-06-06 | CVE-2023-20733 | In vcu, there is a possible use after free due to improper locking. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07645149; Issue ID: ALPS07645149. | Android, Iot\-Yocto, Yocto | 6.7 | ||
2023-06-06 | CVE-2023-20736 | In vcu, there is a possible out of bounds write due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07645149; Issue ID: ALPS07645189. | Android, Iot\-Yocto, Yocto | 6.4 | ||
2023-06-06 | CVE-2023-20737 | In vcu, there is a possible use after free due to improper locking. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07645149; Issue ID: ALPS07645167. | Android, Iot\-Yocto, Yocto | 6.7 |