Show filters
313 Total Results
Displaying 141-150 of 313
Sort by:
Attacker Value
Unknown
CVE-2023-28548
Disclosure Date: September 05, 2023 (last updated October 08, 2023)
Memory corruption in WLAN HAL while processing Tx/Rx commands from QDART.
0
Attacker Value
Unknown
CVE-2023-28544
Disclosure Date: September 05, 2023 (last updated October 08, 2023)
Memory corruption in WLAN while sending transmit command from HLOS to UTF handlers.
0
Attacker Value
Unknown
CVE-2023-21667
Disclosure Date: September 05, 2023 (last updated October 08, 2023)
Transient DOS in Bluetooth HOST while passing descriptor to validate the blacklisted BT keyboard.
0
Attacker Value
Unknown
CVE-2023-21664
Disclosure Date: September 05, 2023 (last updated October 08, 2023)
Memory Corruption in Core Platform while printing the response buffer in log.
0
Attacker Value
Unknown
CVE-2023-21662
Disclosure Date: September 05, 2023 (last updated October 08, 2023)
Memory corruption in Core Platform while printing the response buffer in log.
0
Attacker Value
Unknown
CVE-2023-21654
Disclosure Date: September 05, 2023 (last updated October 08, 2023)
Memory corruption in Audio during playback session with audio effects enabled.
0
Attacker Value
Unknown
CVE-2022-33275
Disclosure Date: September 05, 2023 (last updated October 08, 2023)
Memory corruption due to improper validation of array index in WLAN HAL when received lm_itemNum is out of range.
0
Attacker Value
Unknown
CVE-2023-28577
Disclosure Date: August 08, 2023 (last updated October 08, 2023)
In the function call related to CAM_REQ_MGR_RELEASE_BUF there is no check if the buffer is being used. So when a function called cam_mem_get_cpu_buf to get the kernel va to use, another thread can call CAM_REQ_MGR_RELEASE_BUF to unmap the kernel va which cause UAF of the kernel address.
0
Attacker Value
Unknown
CVE-2023-28576
Disclosure Date: August 08, 2023 (last updated October 08, 2023)
The buffer obtained from kernel APIs such as cam_mem_get_cpu_buf() may be readable/writable in userspace after kernel accesses it. In other words, user mode may race and modify the packet header (e.g. header.count), causing checks (e.g. size checks) in kernel code to be invalid. This may lead to out-of-bounds read/write issues.
0
Attacker Value
Unknown
CVE-2023-28575
Disclosure Date: August 08, 2023 (last updated October 08, 2023)
The cam_get_device_priv function does not check the type of handle being returned (device/session/link). This would lead to invalid type usage if a wrong handle is passed to it.
0