| CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
| Summary:Product: AndroidVersions: Android SoCAndroid ID: A-238257000 |
| Summary:Product: AndroidVersions: Android SoCAndroid ID: A-238257002 |
| Summary:Product: AndroidVersions: Android SoCAndroid ID: A-238227324 |
| Summary:Product: AndroidVersions: Android SoCAndroid ID: A-238227328 |
| a function called 'nla_parse', do not check the len of para, it will check nla_type (which can be controlled by userspace) with 'maxtype' (in this case, it is GSCAN_MAX), then it access polciy array 'policy[type]', which OOB access happens.Product: AndroidVersions: Android SoCAndroid ID: A-238379819 |
| Product: AndroidVersions: Android kernelAndroid ID: A-211727306References: N/A |
| Product: AndroidVersions: Android kernelAndroid ID: A-188935887References: N/A |
| Product: AndroidVersions: Android kernelAndroid ID: A-234657153References: N/A |
| Product: AndroidVersions: Android kernelAndroid ID: A-229632566References: N/A |
| 'remap_pfn_range' here may map out of size kernel memory (for example, may map the kernel area), and because the 'vma->vm_page_prot' can also be controlled by userspace, so userspace may map the kernel area to be writable, which is easy to be exploitedProduct: AndroidVersions: Android SoCAndroid ID: A-233154555 |
| In BuildDevIDResponse of miscdatabuilder.cpp, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-229621649References: N/A |
| In bta_hf_client_handle_cind_list_item of bta_hf_client_at.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-224536184 |
| In read_attr_value of gatt_db.cc, there is a possible out of bounds write due to a missing bounds check. This could lead to remote code execution with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12 Android-12LAndroid ID: A-228078096 |
| android exported is used to set third-party app access permissions, and the default value of intent-filter is true. com.sprd.firewall has set exported as true.Product: AndroidVersions: Android SoCAndroid ID: A-231911916 |
| The UE and the EMM communicate with each other using NAS messages. When a new NAS message arrives from the EMM, the modem parses it and fills in internal objects based on the received data. A bug in the parsing code could be used by an attacker to remotely crash the modem, which could lead to DoS or RCE.Product: AndroidVersions: Android SoCAndroid ID: A-228868888 |
| Product: AndroidVersions: Android kernelAndroid ID: A-209324757References: N/A |
| Product: AndroidVersions: Android kernelAndroid ID: A-207116951References: N/A |
| Product: AndroidVersions: Android kernelAndroid ID: A-215565667References: N/A |
| Product: AndroidVersions: Android kernelAndroid ID: A-209421931References: N/A |
| Product: AndroidVersions: Android kernelAndroid ID: A-204956204References: N/A |