Show filters
699 Total Results
Displaying 41-50 of 699
Sort by:
Attacker Value
Unknown
CVE-2024-33043
Disclosure Date: September 02, 2024 (last updated December 21, 2024)
Transient DOS while handling PS event when Program Service name length offset value is set to 255.
0
Attacker Value
Unknown
CVE-2024-33042
Disclosure Date: September 02, 2024 (last updated September 05, 2024)
Memory corruption when Alternative Frequency offset value is set to 255.
0
Attacker Value
Unknown
CVE-2024-33038
Disclosure Date: September 02, 2024 (last updated September 05, 2024)
Memory corruption while passing untrusted/corrupted pointers from DSP to EVA.
0
Attacker Value
Unknown
CVE-2024-33034
Disclosure Date: August 05, 2024 (last updated November 21, 2024)
Memory corruption can occur if VBOs hold outdated or invalid GPU SMMU mappings, especially when the binding and reclaiming of memory buffers are performed at the same time.
0
Attacker Value
Unknown
CVE-2024-33028
Disclosure Date: August 05, 2024 (last updated November 21, 2024)
Memory corruption as fence object may still be accessed in timeline destruct after isync fence is released.
0
Attacker Value
Unknown
CVE-2024-33027
Disclosure Date: August 05, 2024 (last updated November 21, 2024)
Memory corruption can occur when arbitrary user-space app gains kernel level privilege to modify DDR memory by corrupting the GPU page table.
0
Attacker Value
Unknown
CVE-2024-33023
Disclosure Date: August 05, 2024 (last updated November 21, 2024)
Memory corruption while creating a fence to wait on timeline events, and simultaneously signal timeline events.
0
Attacker Value
Unknown
CVE-2024-33022
Disclosure Date: August 05, 2024 (last updated November 21, 2024)
Memory corruption while allocating memory in HGSL driver.
0
Attacker Value
Unknown
CVE-2024-33021
Disclosure Date: August 05, 2024 (last updated November 21, 2024)
Memory corruption while processing IOCTL call to set metainfo.
0
Attacker Value
Unknown
CVE-2024-33015
Disclosure Date: August 05, 2024 (last updated November 21, 2024)
Transient DOS while parsing SCAN RNR IE when bytes received from AP is such that the size of the last param of IE is less than neighbor report.
0