| CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
| Memory corruption while processing buffer initialization, when trusted report for certain report types are generated. |
| Memory corruption when HLOS allocates the response payload buffer to copy the data received from ADSP in response to AVCS_LOAD_MODULE command. |
| Memory corruption in Audio when memory map command is executed consecutively in ADSP. |
| Information disclosure when VI calibration state set by ADSP is greater than MAX_FBSP_STATE in the response payload to AFE calibration command. |
| Memory corruption during management frame processing due to mismatch in T2LM info element. |
| Memory Corruption in WLAN HOST while parsing QMI WLAN Firmware response message. |
| Memory corruption while processing the event ring, the context read pointer is untrusted to HLOS and when it is passed with arbitrary values, may point to address in the middle of ring element. |
| Memory Corruption in WLAN HOST while parsing QMI response message from firmware. |
| Memory Corruption in Core due to secure memory access by user while loading modem image. |
| Transient DOS while parsing per STA profile in ML IE. |
| Memory corruption while copying the result to the transmission queue which is shared between the virtual machine and the host. |
| Transient DOS while processing 11AZ RTT management action frame received through OTA. |
| Memory corruption in Core when updating rollback version for TA and OTA feature is enabled. |
| Cryptographic issue in Automotive while unwrapping the key secs2d and verifying with RPMB data. |
| Information disclosure in Core services while processing a Diag command. |
| Memory corruption in HLOS while running playready use-case. |
| Memory corruption in Automotive Multimedia due to improper access control in HAB. |
| Transient DOS can occur when GVM sends a specific message type to the Vdev-FastRPC backend. |
| Memory corruption can occur if an already verified IFS2 image is overwritten, bypassing boot verification. This allows unauthorized programs to be injected into security-sensitive images, enabling the booting of a tampered IFS2 system image. |
| Uncontrolled resource consumption when a driver, an application or a SMMU client tries to access the global registers through SMMU. |