240 known vulnerabilities · sorted by CVSS score
Memory corruption when the UE receives an RTP packet from the network, during the reassembly of NALUs.
Memory corruption while parsing beacon/probe response frame when AP sends more supported links in MLIE.
Memory corruption while parsing the ML IE due to invalid frame content.
Memory corruption while processing MBSSID beacon containing several subelement IE.
Memory corruption in Core while processing control functions.
Memory corruption in Core Services while executing the command for removing a single event listener.
Memory Corruption when a corrupted ELF image with an oversized file size is read into a buffer without authentication.
Memory corruption while configuring a Hypervisor based input virtual device.
Memory corruption while validating the TID to Link Mapping action request frame, when a station connects to an access point.
Memory corruption when AP includes TID to link mapping IE in the beacons and STA is parsing the beacon TID to link mapping IE.
Memory corruption while processing finish_sign command to pass a rsp buffer.
Memory corruption when BTFM client sends new messages over Slimbus to ADSP.
Memory corruption can occur if an already verified IFS2 image is overwritten, bypassing boot verification. This allows unauthorized programs to be injected into security-sensitive images, enabling the booting of a tampered IFS2 system image.
Memory corruption when memory mapped in a VBO is not unmapped by the GPU SMMU.
Memory corruption while invoking HGSL IOCTL context create.
Memory corruption while Configuring the SMR/S2CR register in Bypass mode.
Memory corruption while verifying the serialized header when the key pairs are generated.
Memory corruption while calculating total metadata size when a very high reserved size is requested by gralloc clients.
Memory corruption as GPU registers beyond the last protected range can be accessed through LPAC submissions.
Memory corruption when two threads try to map and unmap a single node simultaneously.