Show filters
79 Total Results
Displaying 11-20 of 79
Sort by:
Attacker Value
Unknown

CVE-2024-38399

Disclosure Date: October 07, 2024 (last updated October 17, 2024)
Memory corruption while processing user packets to generate page faults.
Attacker Value
Unknown

CVE-2024-33049

Disclosure Date: October 07, 2024 (last updated October 17, 2024)
Transient DOS while parsing noninheritance IE of Extension element when length of IE is 2 of beacon frame.
Attacker Value
Unknown

CVE-2024-21455

Disclosure Date: October 07, 2024 (last updated October 17, 2024)
Memory corruption when a compat IOCTL call is followed by another IOCTL call from userspace to a driver.
Attacker Value
Unknown

CVE-2024-33043

Disclosure Date: September 02, 2024 (last updated December 21, 2024)
Transient DOS while handling PS event when Program Service name length offset value is set to 255.
Attacker Value
Unknown

CVE-2024-33034

Disclosure Date: August 05, 2024 (last updated November 21, 2024)
Memory corruption can occur if VBOs hold outdated or invalid GPU SMMU mappings, especially when the binding and reclaiming of memory buffers are performed at the same time.
Attacker Value
Unknown

CVE-2024-33028

Disclosure Date: August 05, 2024 (last updated November 21, 2024)
Memory corruption as fence object may still be accessed in timeline destruct after isync fence is released.
Attacker Value
Unknown

CVE-2024-33023

Disclosure Date: August 05, 2024 (last updated November 21, 2024)
Memory corruption while creating a fence to wait on timeline events, and simultaneously signal timeline events.
Attacker Value
Unknown

CVE-2024-33022

Disclosure Date: August 05, 2024 (last updated November 21, 2024)
Memory corruption while allocating memory in HGSL driver.
Attacker Value
Unknown

CVE-2024-33021

Disclosure Date: August 05, 2024 (last updated November 21, 2024)
Memory corruption while processing IOCTL call to set metainfo.
Attacker Value
Unknown

CVE-2024-33015

Disclosure Date: August 05, 2024 (last updated November 21, 2024)
Transient DOS while parsing SCAN RNR IE when bytes received from AP is such that the size of the last param of IE is less than neighbor report.