Show filters
94 Total Results
Displaying 11-20 of 94
Sort by:
Attacker Value
Unknown
CVE-2024-38399
Disclosure Date: October 07, 2024 (last updated October 17, 2024)
Memory corruption while processing user packets to generate page faults.
0
Attacker Value
Unknown
CVE-2024-33049
Disclosure Date: October 07, 2024 (last updated October 17, 2024)
Transient DOS while parsing noninheritance IE of Extension element when length of IE is 2 of beacon frame.
0
Attacker Value
Unknown
CVE-2024-21455
Disclosure Date: October 07, 2024 (last updated October 17, 2024)
Memory corruption when a compat IOCTL call is followed by another IOCTL call from userspace to a driver.
0
Attacker Value
Unknown
CVE-2024-33043
Disclosure Date: September 02, 2024 (last updated December 21, 2024)
Transient DOS while handling PS event when Program Service name length offset value is set to 255.
0
Attacker Value
Unknown
CVE-2024-33034
Disclosure Date: August 05, 2024 (last updated November 21, 2024)
Memory corruption can occur if VBOs hold outdated or invalid GPU SMMU mappings, especially when the binding and reclaiming of memory buffers are performed at the same time.
0
Attacker Value
Unknown
CVE-2024-33028
Disclosure Date: August 05, 2024 (last updated November 21, 2024)
Memory corruption as fence object may still be accessed in timeline destruct after isync fence is released.
0
Attacker Value
Unknown
CVE-2024-33023
Disclosure Date: August 05, 2024 (last updated November 21, 2024)
Memory corruption while creating a fence to wait on timeline events, and simultaneously signal timeline events.
0
Attacker Value
Unknown
CVE-2024-33022
Disclosure Date: August 05, 2024 (last updated November 21, 2024)
Memory corruption while allocating memory in HGSL driver.
0
Attacker Value
Unknown
CVE-2024-33021
Disclosure Date: August 05, 2024 (last updated November 21, 2024)
Memory corruption while processing IOCTL call to set metainfo.
0
Attacker Value
Unknown
CVE-2024-33015
Disclosure Date: August 05, 2024 (last updated November 21, 2024)
Transient DOS while parsing SCAN RNR IE when bytes received from AP is such that the size of the last param of IE is less than neighbor report.
0