Page 2 of 637 results (0.002 seconds)

CVSS: 6.7EPSS: 0%CPEs: 14EXPL: 0

07 Oct 2024 — Memory corruption during the network scan request. • https://docs.qualcomm.com/product/publicresources/securitybulletin/october-2024-bulletin.html • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVSS: 6.7EPSS: 0%CPEs: 26EXPL: 0

07 Oct 2024 — Memory corruption is possible when an attempt is made from userspace or console to write some haptics effects pattern to the haptics debugfs file. • https://docs.qualcomm.com/product/publicresources/securitybulletin/october-2024-bulletin.html • CWE-121: Stack-based Buffer Overflow •

CVSS: 6.7EPSS: 0%CPEs: 11EXPL: 0

07 Oct 2024 — Memory corruption when a process invokes IOCTL calls from user-space to create a HAB virtual channel and another process invokes IOCTL calls to destroy the same. • https://docs.qualcomm.com/product/publicresources/securitybulletin/october-2024-bulletin.html • CWE-416: Use After Free •

CVSS: 7.8EPSS: 0%CPEs: 20EXPL: 1

07 Oct 2024 — Memory corruption when a compat IOCTL call is followed by another IOCTL call from userspace to a driver. • https://packetstorm.news/files/id/182180 • CWE-822: Untrusted Pointer Dereference •

CVSS: 7.8EPSS: 0%CPEs: 42EXPL: 0

02 Sep 2024 — Memory corruption while processing concurrent IOCTL calls. e.g. qrtr_bpf_filter_attach and qrtr_bpf_filter_detach. In the case of qrtr_bpf_filter_detach, the global pointer bpf_filter is fetched and freed while only holding a socket lock (and an irrelevant rcu_read_lock) - this may lead directly to double frees or use-after-free (kernel memory corruption) if a malicious user is able to call the QRTR_DETTACH_BPF ioctl on multiple AF_QIPCRTR sockets at once. Based on Android SELinux files, it appears this may... • https://docs.qualcomm.com/product/publicresources/securitybulletin/september-2024-bulletin.html • CWE-416: Use After Free •

CVSS: 8.4EPSS: 0%CPEs: 69EXPL: 0

05 Aug 2024 — Memory corruption when kernel driver attempts to trigger hardware fences. • https://docs.qualcomm.com/product/publicresources/securitybulletin/august-2024-bulletin.html • CWE-416: Use After Free •

CVSS: 8.4EPSS: 0%CPEs: 70EXPL: 0

05 Aug 2024 — Memory corruption when memory mapped in a VBO is not unmapped by the GPU SMMU. • https://docs.qualcomm.com/product/publicresources/securitybulletin/august-2024-bulletin.html • CWE-416: Use After Free •

CVSS: 8.4EPSS: 0%CPEs: 212EXPL: 0

01 Jul 2024 — Memory corruption while handling user packets during VBO bind operation. Corrupción de la memoria al manejar paquetes de usuario durante la operación de enlace VBO. • https://docs.qualcomm.com/product/publicresources/securitybulletin/july-2024-bulletin.html • CWE-416: Use After Free •

CVSS: 8.4EPSS: 0%CPEs: 444EXPL: 0

01 Jul 2024 — Memory corruption when IOMMU unmap operation fails, the DMA and anon buffers are getting released. Corrupción de la memoria cuando falla la operación de desasignación de IOMMU, se liberan los búferes DMA y anon. • https://docs.qualcomm.com/product/publicresources/securitybulletin/july-2024-bulletin.html • CWE-416: Use After Free •

CVSS: 8.4EPSS: 0%CPEs: 222EXPL: 0

01 Jul 2024 — Memory corruption while invoking IOCTL call for GPU memory allocation and size param is greater than expected size. La memoria se daña al invocar una llamada IOCTL para la asignación de memoria de la GPU y el parámetro de tamaño es mayor que el tamaño esperado. • https://docs.qualcomm.com/product/publicresources/securitybulletin/july-2024-bulletin.html • CWE-190: Integer Overflow or Wraparound •