| CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
| Memory corruption in Core Services while executing the command for removing a single event listener. |
| Memory corruption while processing buffer initialization, when trusted report for certain report types are generated. |
| Information disclosure when VI calibration state set by ADSP is greater than MAX_FBSP_STATE in the response payload to AFE calibration command. |
| Memory corruption in HLOS while converting from authorization token to HIDL vector. |
| Memory corruption in Core while processing control functions. |
| Memory corruption in Audio while processing IIR config data from AFE calibration block. |
| Memory corruption while operating the mailbox in Automotive. |
| Memory corruption in Audio while calling START command on host voice PCM multiple times for the same RX or TX tap points. |
| Information disclosure in Audio while accessing AVCS services from ADSP payload. |
| Transient DOS in Audio when invoking callback function of ASM driver. |
| Memory corruption whhile handling the subsystem failure memory during the parsing of video packets received from the video firmware. |
| Memory corruption while processing finish_sign command to pass a rsp buffer. |
| Memory corruption in SPS Application while requesting for public key in sorter TA. |
| Transient DOS can occur when the driver parses the per STA profile IE and tries to access the EXTN element ID without checking the IE length. |
| Memory corruption while copying the result to the transmission queue which is shared between the virtual machine and the host. |
| Memory corruption in Core when updating rollback version for TA and OTA feature is enabled. |
| Memory corruption in Automotive Multimedia due to improper access control in HAB. |
| Transient DOS can occur when GVM sends a specific message type to the Vdev-FastRPC backend. |
| Memory corruption can occur if an already verified IFS2 image is overwritten, bypassing boot verification. This allows unauthorized programs to be injected into security-sensitive images, enabling the booting of a tampered IFS2 system image. |
| Uncontrolled resource consumption when a driver, an application or a SMMU client tries to access the global registers through SMMU. |