49 known vulnerabilities · sorted by CVSS score
Memory corruption in Core Services while executing the command for removing a single event listener.
Cryptographic issue while performing attach with a LTE network, a rogue base station can skip the authentication phase and immediately send the Security Mode Command.
Cryptographic issue occurs due to use of insecure connection method while downloading.
Memory corruption while processing finish_sign command to pass a rsp buffer.
Memory corruption when there is failed unmap operation in GPU.
Memory corruption when two threads try to map and unmap a single node simultaneously.
Memory corruption in SPS Application while requesting for public key in sorter TA.
Memory corruption while invoking IOCTLs calls in Automotive Multimedia.
Memory corruption while invoking HGSL IOCTL context create.
Memory corruption when IOMMU unmap of a GPU buffer fails in Linux.
Memory corruption as GPU registers beyond the last protected range can be accessed through LPAC submissions.
Memory corruption in Audio while processing RT proxy port register driver.
Information disclosure in Video while parsing mp2 clip with invalid section length.
Information disclosure while parsing the OCI IE with invalid length.
Information disclosure while decoding this RTP packet Payload when UE receives the RTP packet from the network.
Memory corruption while processing video packets received from video firmware.
Memory corruption while processing data packets in diag received from Unix clients.
Memory corruption when the payload received from firmware is not as per the expected protocol size.
Memory corruption can occur when a compat IOCTL call is followed by a normal IOCTL call from userspace.
Memory corruption while copying a keyblob`s material when the key material`s size is not accurately checked.