624 results (0.001 seconds)

CVSS: 7.8EPSS: 0%CPEs: 82EXPL: 0

04 Nov 2024 — Memory corruption while processing GPU commands. • https://docs.qualcomm.com/product/publicresources/securitybulletin/november-2024-bulletin.html • CWE-416: Use After Free •

CVSS: 7.5EPSS: 0%CPEs: 103EXPL: 0

04 Nov 2024 — Transient DOS while processing the CU information from RNR IE. • https://docs.qualcomm.com/product/publicresources/securitybulletin/november-2024-bulletin.html • CWE-126: Buffer Over-read •

CVSS: 7.8EPSS: 0%CPEs: 5EXPL: 0

07 Oct 2024 — Transient DOS while parsing the MBSSID IE from the beacons when IE length is 0. • https://docs.qualcomm.com/product/publicresources/securitybulletin/october-2024-bulletin.html • CWE-126: Buffer Over-read •

CVSS: 7.8EPSS: 0%CPEs: 5EXPL: 0

07 Oct 2024 — Transient DOS while parsing ESP IE from beacon/probe response frame. • https://docs.qualcomm.com/product/publicresources/securitybulletin/october-2024-bulletin.html • CWE-126: Buffer Over-read •

CVSS: 7.8EPSS: 0%CPEs: 44EXPL: 0

07 Oct 2024 — Transient DOS when transmission of management frame sent by host is not successful and error status is received in the host. • https://docs.qualcomm.com/product/publicresources/securitybulletin/october-2024-bulletin.html • CWE-416: Use After Free •

CVSS: 8.5EPSS: 0%CPEs: 5EXPL: 0

07 Oct 2024 — Information disclosure while parsing the multiple MBSSID IEs from the beacon. • https://docs.qualcomm.com/product/publicresources/securitybulletin/october-2024-bulletin.html • CWE-126: Buffer Over-read •

CVSS: 7.8EPSS: 0%CPEs: 120EXPL: 0

07 Oct 2024 — Memory corruption when invalid length is provided from HLOS for FRS/UDS request/response buffers. • https://docs.qualcomm.com/product/publicresources/securitybulletin/october-2024-bulletin.html • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 7.8EPSS: 0%CPEs: 42EXPL: 0

02 Sep 2024 — Memory corruption while processing concurrent IOCTL calls. e.g. qrtr_bpf_filter_attach and qrtr_bpf_filter_detach. In the case of qrtr_bpf_filter_detach, the global pointer bpf_filter is fetched and freed while only holding a socket lock (and an irrelevant rcu_read_lock) - this may lead directly to double frees or use-after-free (kernel memory corruption) if a malicious user is able to call the QRTR_DETTACH_BPF ioctl on multiple AF_QIPCRTR sockets at once. Based on Android SELinux files, it appears this may... • https://docs.qualcomm.com/product/publicresources/securitybulletin/september-2024-bulletin.html • CWE-416: Use After Free •

CVSS: 7.8EPSS: 0%CPEs: 95EXPL: 0

05 Aug 2024 — Transient DOS while processing TID-to-link mapping IE elements. • https://docs.qualcomm.com/product/publicresources/securitybulletin/august-2024-bulletin.html • CWE-126: Buffer Over-read •

CVSS: 8.4EPSS: 0%CPEs: 69EXPL: 0

05 Aug 2024 — Memory corruption when kernel driver attempts to trigger hardware fences. • https://docs.qualcomm.com/product/publicresources/securitybulletin/august-2024-bulletin.html • CWE-416: Use After Free •