| CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
| Improper handling of address deregistration on failure can lead to new GPU address allocation failure. in Snapdragon Auto, Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music, Snapdragon Wearables |
| Memory corruption in DSP Services during a remote call from HLOS to DSP. |
| Information disclosure may occur during a video call if a device resets due to a non-conforming RTCP packet that doesn`t adhere to RFC standards. |
| Cryptographic issue occurs during PIN/password verification using Gatekeeper, where RPMB writes can be dropped on verification failure, potentially leading to a user throttling bypass. |
| Transient DOS while connecting STA to AP and initiating ADD TS request from AP to establish TSpec session. |
| memory corruption when an invalid firehose patch command is invoked. |
| Memory corruption while processing video packets received from video firmware. |
| Memory Corruption in Modem due to double free while parsing the PKCS15 sim files. |
| Transient DOS in Automotive OS due to improper authentication to the secure IO calls. |
| Transient DOS in WLAN Firmware when the length of received beacon is less than length of ieee802.11 beacon frame. |
| Memory Corruption in WLAN HOST while fetching TX status information. |
| Transient DOS while processing IKEv2 Informational request messages, when a malformed fragment packet is received. |
| While processing the authentication message in UE, improper authentication may lead to information disclosure. |
| Memory Corruption in HLOS while importing a cryptographic key into KeyMaster Trusted Application. |
| Information disclosure in WLAN HAL while handling the WMI state info command. |
| Memory corruption while processing finish_sign command to pass a rsp buffer. |
| Memory corruption in MPP performance while accessing DSM watermark using external memory address. |
| Cryptographic issue while performing attach with a LTE network, a rogue base station can skip the authentication phase and immediately send the Security Mode Command. |
| Memory Corruption in Audio while allocating the ion buffer during the music playback. |
| Memory Corruption in Core due to secure memory access by user while loading modem image. |