12 known vulnerabilities · sorted by CVSS score
Memory Corruption when adding user-supplied data without checking available buffer space.
Memory Corruption while invoking IOCTL calls when concurrent access to shared buffer occurs.
Memory Corruption when concurrent access to shared buffer occurs due to improper synchronization between assignment and deallocation of buffer resources.
Memory Corruption when concurrent access to shared buffer occurs during IOCTL calls.
Memory corruption while using alignments for memory allocation.
Memory Corruption when accessing buffers with invalid length during TA invocation.
Memory Corruption when accessing a buffer after it has been freed while processing IOCTL calls.
Memory corruption while handling different IOCTL calls from the user-space simultaneously.
Memory Corruption while deallocating graphics processing unit memory buffers due to improper handling of memory pointers.
Memory Corruption when initiating GPU memory mapping using scatter-gather lists due to unchecked IOMMU mapping errors.
Weak configuration may lead to cryptographic issue when a VoWiFi call is triggered from UE.
Transient DOS when an LTE RLC packet with invalid TB is received by UE.