| CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
| Memory corruption while Configuring the SMR/S2CR register in Bypass mode. |
| Memory corruption while invoking redundant release command to release one buffer from user space as race condition can occur in kernel space between buffer release and buffer access. |
| Information disclosure as NPU firmware can send invalid IPC message to NPU driver as the driver doesn`t validate the IPC message received from the firmware. |
| Memory corruption while parsing sensor packets in camera driver, user-space variable is used while allocating memory in kernel and parsing which can lead to huge allocation or invalid memory access. |
| Memory corruption during session sign renewal request calls in HLOS. |
| Transient DOS when NAS receives ODAC criteria of length 1 and type 1 in registration accept OTA. |
| Transient DOS during music playback of ALAC content. |
| Information disclosure while handling beacon probe frame during scan entry generation in client side. |
| Transient DOS while decoding attach reject message received by UE, when IEI is set to ESM_IEI. |
| Memory corruption when keymaster operation imports a shared key. |
| Transient DOS while importing a PKCS#8-encoded RSA key with zero bytes modulus. |
| Memory corruption in WLAN Firmware while parsing a NAN management frame carrying a S3 attribute. |
| Memory corruption while receiving a message in Bus Socket Transport Server. |
| Permanent DOS in Hypervisor while untrusted VM without PSCI support makes a PSCI call. |
| Memory corruption in Graphics while processing user packets for command submission. |
| Transient DOS in WLAN Firmware while interpreting MBSSID IE of a received beacon frame. |
| In the function call related to CAM_REQ_MGR_RELEASE_BUF there is no check if the buffer is being used. So when a function called cam_mem_get_cpu_buf to get the kernel va to use, another thread can call CAM_REQ_MGR_RELEASE_BUF to unmap the kernel va which cause UAF of the kernel address. |
| The buffer obtained from kernel APIs such as cam_mem_get_cpu_buf() may be readable/writable in userspace after kernel accesses it. In other words, user mode may race and modify the packet header (e.g. header.count), causing checks (e.g. size checks) in kernel code to be invalid. This may lead to out-of-bounds read/write issues. |
| The cam_get_device_priv function does not check the type of handle being returned (device/session/link). This would lead to invalid type usage if a wrong handle is passed to it. |
| Memory corruption in WLAN HAL while parsing WMI command parameters. |