| CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
| Memory corruption can occur when process-specific maps are added to the global list. If a map is removed from the global list while another thread is using it for a process-specific task, issues may arise. |
| Cryptographic issue occurs due to use of insecure connection method while downloading. |
| Transient DOS when importing a PKCS#8-encoded RSA private key with a zero-sized modulus. |
| Memory corruption in display driver while detaching a device. |
| Memory corruption may occur while validating ports and channels in Audio driver. |
| Cryptographic issue while processing crypto API calls, missing checks may lead to corrupted key usage or IV reuses. |
| Memory corruption while reading response from FW, when buffer size is changed by FW while driver is using this size to write null character at the end of buffer. |
| Weak Configuration due to improper input validation in Modem while processing LTE security mode command message received from network. |
| Memory Corruption in Modem due to double free while parsing the PKCS15 sim files. |
| Cryptographic issue while performing attach with a LTE network, a rogue base station can skip the authentication phase and immediately send the Security Mode Command. |
| Memory Corruption in WLAN HOST while processing WLAN FW request to allocate memory. |
| Arbitrary memory overwrite when VM gets compromised in TX write leading to Memory Corruption. |
| Memory Corruption in Audio while allocating the ion buffer during the music playback. |
| Memory Corruption in WLAN HOST while parsing QMI WLAN Firmware response message. |
| Memory Corruption in WLAN HOST while parsing QMI response message from firmware. |
| Memory Corruption in Core due to secure memory access by user while loading modem image. |
| Memory corruption in SPS Application while requesting for public key in sorter TA. |
| Information disclosure in IOE Firmware while handling WMI command. |
| Memory Corruption in WLAN HOST while fetching TX status information. |
| Memory corruption while processing a data structure, when an iterator is accessed after it has been removed, potential failures occur. |