| CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
| Memory corruption while processing the event ring, the context read pointer is untrusted to HLOS and when it is passed with arbitrary values, may point to address in the middle of ring element. |
| Memory Corruption in Core due to secure memory access by user while loading modem image. |
| Transient DOS while parsing probe response and assoc response frame. |
| Memory corruption while processing IOCTL call for getting group info. |
| Memory corruption while processing MBSSID beacon containing several subelement IE. |
| Improper Access to the VM resource manager can lead to Memory Corruption. |
| Transient DOS may occur while processing the country IE. |
| Transient DOS can occur when the driver parses the per STA profile IE and tries to access the EXTN element ID without checking the IE length. |
| Information disclosure while parsing the BSS parameter change count or MLD capabilities fields of the ML IE. |
| Memory corruption during management frame processing due to mismatch in T2LM info element. |
| Memory corruption whhile handling the subsystem failure memory during the parsing of video packets received from the video firmware. |
| Transient DOS may occur when processing vendor-specific information elements while parsing a WLAN frame for BTM requests. |
| Transient DOS when importing a PKCS#8-encoded RSA private key with a zero-sized modulus. |
| Transient DOS while processing received beacon frame. |
| Memory corruption while copying the result to the transmission queue which is shared between the virtual machine and the host. |
| Memory corruption in Core when updating rollback version for TA and OTA feature is enabled. |
| Memory corruption in Automotive Multimedia due to improper access control in HAB. |
| Transient DOS can occur when GVM sends a specific message type to the Vdev-FastRPC backend. |
| Memory corruption can occur if an already verified IFS2 image is overwritten, bypassing boot verification. This allows unauthorized programs to be injected into security-sensitive images, enabling the booting of a tampered IFS2 system image. |
| Uncontrolled resource consumption when a driver, an application or a SMMU client tries to access the global registers through SMMU. |