| CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
| A vulnerability in Universal Disk Format (UDF) processing of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.
This vulnerability is due to a memory overread during UDF file scanning. An attacker could exploit this vulnerability by submitting a crafted file containing UDF content to be scanned by ClamAV on an affected device. A successful exploit could allow the attacker to terminate the ClamAV scanning process, resulting in a DoS condition on the affected software.
For a description of this vulnerability, see the . |
| Out-of-bounds array access issue due to insufficient data verification in the kernel ambient light module.
Impact: Successful exploitation of this vulnerability may affect service confidentiality. |
| Out-of-bounds read vulnerability in the register configuration of the DMA module.
Impact: Successful exploitation of this vulnerability may affect service confidentiality. |
| Transient DOS in WLAN Firmware while parsing rsn ies. |
| Information disclosure in Audio while accessing AVCS services from ADSP payload. |
| Transient DOS during hypervisor virtual I/O operation in a virtual machine. |
| Transient DOS in WLAN Firmware while parsing no-inherit IES. |
| Transient DOS while processing received beacon frame. |
| Transient DOS in Audio when invoking callback function of ASM driver. |
| Transient DOS while parsing per STA profile in ML IE. |
| Information disclosure when the ADSP payload size received in HLOS in response to Audio Stream Manager matrix session is less than this expected size. |
| Memory corruption while processing escape code, when DisplayId is passed with large unsigned value. |
| Information disclosure while handling T2LM Action Frame in WLAN Host. |
| Information disclosure in Video while parsing mp2 clip with invalid section length. |
| Information disclosure while parsing dts header atom in Video. |
| Transient DOS in WLAN Firmware when the length of received beacon is less than length of ieee802.11 beacon frame. |
| Transient DOS may occur when processing vendor-specific information elements while parsing a WLAN frame for BTM requests. |
| Transient DOS while parsing a vender specific IE (Information Element) of reassociation response management frame. |
| Memory corruption during management frame processing due to mismatch in T2LM info element. |
| Transient DOS can occur when the driver parses the per STA profile IE and tries to access the EXTN element ID without checking the IE length. |