Iot Yocto Linux Foundation Iot Yocto

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in Linux Foundation Iot Yocto.

By the Year

In 2025 there have been 0 vulnerabilities in Linux Foundation Iot Yocto. Iot Yocto did not have any published security vulnerabilities last year.

Year Vulnerabilities Average Score
2025 0 0.00
2024 0 0.00
2023 12 6.48
2022 0 0.00
2021 0 0.00
2020 0 0.00
2019 0 0.00
2018 0 0.00

It may take a day or so for new Iot Yocto vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Linux Foundation Iot Yocto Security Vulnerabilities

In vcu, there is a possible memory corruption due to type confusion

CVE-2023-20747 4.4 - Medium - June 06, 2023

In vcu, there is a possible memory corruption due to type confusion. This could lead to local denial of service with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07519103; Issue ID: ALPS07519121.

Object Type Confusion

In vcu, there is a possible out of bounds write due to improper locking

CVE-2023-20746 6.7 - Medium - June 06, 2023

In vcu, there is a possible out of bounds write due to improper locking. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07519142; Issue ID: ALPS07519217.

Improper Locking

In vcu, there is a possible out of bounds write due to improper locking

CVE-2023-20745 6.7 - Medium - June 06, 2023

In vcu, there is a possible out of bounds write due to improper locking. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07519142; Issue ID: ALPS07560694.

Improper Locking

In vcu, there is a possible use after free due to a logic error

CVE-2023-20744 6.7 - Medium - June 06, 2023

In vcu, there is a possible use after free due to a logic error. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07519142; Issue ID: ALPS07519200.

Dangling pointer

In vcu, there is a possible out of bounds write due to improper locking

CVE-2023-20743 6.7 - Medium - June 06, 2023

In vcu, there is a possible out of bounds write due to improper locking. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07519142; Issue ID: ALPS07519142.

Improper Locking

In vcu, there is a possible memory corruption due to a logic error

CVE-2023-20740 6.7 - Medium - June 06, 2023

In vcu, there is a possible memory corruption due to a logic error. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07559819; Issue ID: ALPS07559840.

Memory Corruption

In vcu, there is a possible out of bounds write due to a missing bounds check

CVE-2023-20738 6.7 - Medium - June 06, 2023

In vcu, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07645149; Issue ID: ALPS07645173.

Memory Corruption

In vcu, there is a possible use after free due to improper locking

CVE-2023-20737 6.7 - Medium - June 06, 2023

In vcu, there is a possible use after free due to improper locking. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07645149; Issue ID: ALPS07645167.

Improper Locking

In vcu, there is a possible out of bounds write due to a race condition

CVE-2023-20736 6.4 - Medium - June 06, 2023

In vcu, there is a possible out of bounds write due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07645149; Issue ID: ALPS07645189.

Race Condition

In vcu, there is a possible out of bounds write due to a missing bounds check

CVE-2023-20735 6.7 - Medium - June 06, 2023

In vcu, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07645149; Issue ID: ALPS07645178.

Memory Corruption

In vcu, there is a possible out of bounds write due to a missing bounds check

CVE-2023-20734 6.7 - Medium - June 06, 2023

In vcu, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07645149; Issue ID: ALPS07645184.

Memory Corruption

In vcu, there is a possible use after free due to improper locking

CVE-2023-20733 6.7 - Medium - June 06, 2023

In vcu, there is a possible use after free due to improper locking. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation. Patch ID: ALPS07645149; Issue ID: ALPS07645149.

Improper Locking

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Google Android or by Linux Foundation? Click the Watch button to subscribe.

subscribe