Show filters
428 Total Results
Displaying 101-110 of 428
Sort by:
Attacker Value
Unknown

CVE-2023-28560

Disclosure Date: September 05, 2023 (last updated October 08, 2023)
Memory corruption in WLAN HAL while processing devIndex from untrusted WMI payload.
Attacker Value
Unknown

CVE-2023-21667

Disclosure Date: September 05, 2023 (last updated October 08, 2023)
Transient DOS in Bluetooth HOST while passing descriptor to validate the blacklisted BT keyboard.
Attacker Value
Unknown

CVE-2023-21663

Disclosure Date: September 05, 2023 (last updated October 08, 2023)
Memory Corruption while accessing metadata in Display.
Attacker Value
Unknown

CVE-2023-21655

Disclosure Date: September 05, 2023 (last updated October 08, 2023)
Memory corruption in Audio while validating and mapping metadata.
Attacker Value
Unknown

CVE-2023-21654

Disclosure Date: September 05, 2023 (last updated October 08, 2023)
Memory corruption in Audio during playback session with audio effects enabled.
Attacker Value
Unknown

CVE-2023-21644

Disclosure Date: September 05, 2023 (last updated October 08, 2023)
Memory corruption in RIL due to Integer Overflow while triggering qcril_uim_request_apdu request.
Attacker Value
Unknown

CVE-2023-21636

Disclosure Date: September 05, 2023 (last updated October 08, 2023)
Memory Corruption due to improper validation of array index in Linux while updating adn record.
Attacker Value
Unknown

CVE-2022-40524

Disclosure Date: September 05, 2023 (last updated October 08, 2023)
Memory corruption due to buffer over-read in Modem while processing SetNativeHandle RTP service.
Attacker Value
Unknown

CVE-2023-28577

Disclosure Date: August 08, 2023 (last updated October 08, 2023)
In the function call related to CAM_REQ_MGR_RELEASE_BUF there is no check if the buffer is being used. So when a function called cam_mem_get_cpu_buf to get the kernel va to use, another thread can call CAM_REQ_MGR_RELEASE_BUF to unmap the kernel va which cause UAF of the kernel address.
Attacker Value
Unknown

CVE-2023-28576

Disclosure Date: August 08, 2023 (last updated October 08, 2023)
The buffer obtained from kernel APIs such as cam_mem_get_cpu_buf() may be readable/writable in userspace after kernel accesses it. In other words, user mode may race and modify the packet header (e.g. header.count), causing checks (e.g. size checks) in kernel code to be invalid. This may lead to out-of-bounds read/write issues.