263 known vulnerabilities · sorted by CVSS score
Memory corruption when the UE receives an RTP packet from the network, during the reassembly of NALUs.
Memory corruption while parsing the ML IE due to invalid frame content.
Memory corruption while parsing beacon/probe response frame when AP sends more supported links in MLIE.
Memory corruption while processing MBSSID beacon containing several subelement IE.
Memory corruption in Core Services while executing the command for removing a single event listener.
Memory corruption in Core while processing control functions.
Memory corruption in TZ Secure OS while Tunnel Invoke Manager initialization.
Memory Corruption when a corrupted ELF image with an oversized file size is read into a buffer without authentication.
Memory corruption while configuring a Hypervisor based input virtual device.
Memory corruption while validating the TID to Link Mapping action request frame, when a station connects to an access point.
Memory corruption when AP includes TID to link mapping IE in the beacons and STA is parsing the beacon TID to link mapping IE.
Memory corruption can occur if an already verified IFS2 image is overwritten, bypassing boot verification. This allows unauthorized programs to be injected into security-sensitive images, enabling the booting of a tampered IFS2 system image.
Memory corruption when memory mapped in a VBO is not unmapped by the GPU SMMU.
Memory corruption when IOMMU unmap of a GPU buffer fails in Linux.
Memory corruption in Graphics Linux while assigning shared virtual memory region during IOCTL call.
Memory corruption while submitting a large list of sync points in an AUX command to the IOCTL_KGSL_GPU_AUX_COMMAND.
Memory corruption while processing finish_sign command to pass a rsp buffer.
Memory corruption while verifying the serialized header when the key pairs are generated.
Memory corruption while calculating total metadata size when a very high reserved size is requested by gralloc clients.
Memory corruption as GPU registers beyond the last protected range can be accessed through LPAC submissions.