| CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
| Memory corruption when resource manager sends the host kernel a reply message with multiple fragments. |
| Memory corruption when HLOS allocates the response payload buffer to copy the data received from ADSP in response to AVCS_LOAD_MODULE command. |
| Memory corruption while processing Listen Sound Model client payload buffer when there is a request for Listen Sound session get parameter from ST HAL. |
| Memory corruption in Audio when memory map command is executed consecutively in ADSP. |
| Memory corruption while processing IOCTL call for getting group info. |
| While processing the authentication message in UE, improper authentication may lead to information disclosure. |
| Memory corruption in video while parsing invalid mp2 clip. |
| Memory corruption while invoking HGSL IOCTL context create. |
| Transient DOS while parsing IPv6 extension header when WLAN firmware receives an IPv6 packet that contains `IPPROTO_NONE` as the next header. |
| Memory corruption while processing the event ring, the context read pointer is untrusted to HLOS and when it is passed with arbitrary values, may point to address in the middle of ring element. |
| Memory corruption while invoking IOCTLs calls from user space for internal mem MAP and internal mem UNMAP. |
| Transient DOS while key unwrapping process, when the given encrypted key is empty or NULL. |
| Transient DOS while processing IKEv2 Informational request messages, when a malformed fragment packet is received. |
| Memory corruption while invoking IOCTLs calls in Automotive Multimedia. |
| Transient DOS in WLAN Firmware when the length of received beacon is less than length of ieee802.11 beacon frame. |
| Transient DOS while parse fils IE with length equal to 1. |
| Memory corruption while copying a keyblob`s material when the key material`s size is not accurately checked. |
| Memory corruption while processing a QMI request for allocating memory from a DHMS supported subsystem. |
| Cryptographic issue while performing attach with a LTE network, a rogue base station can skip the authentication phase and immediately send the Security Mode Command. |
| Information disclosure in Video while parsing mp2 clip with invalid section length. |