[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248268

 
 

909

 
 

195051

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 13889 Download | Alert*

Memory corruption while allocating memory in COmxApeDec module in Audio.

Transient DOS in Audio while remapping channel buffer in media codec decoding.

Memory corruption in QESL while processing payload from external ESL device to firmware.

The cam_get_device_priv function does not check the type of handle being returned (device/session/link). This would lead to invalid type usage if a wrong handle is passed to it.

The buffer obtained from kernel APIs such as cam_mem_get_cpu_buf() may be readable/writable in userspace after kernel accesses it. In other words, user mode may race and modify the packet header (e.g. header.count), causing checks (e.g. size checks) in kernel code to be invalid. This may lead to out-of-bounds read/write issues.

In the function call related to CAM_REQ_MGR_RELEASE_BUF there is no check if the buffer is being used. So when a function called cam_mem_get_cpu_buf to get the kernel va to use, another thread can call CAM_REQ_MGR_RELEASE_BUF to unmap the kernel va which cause UAF of the kernel address.

Java Development Kit 22 is installed on Mac OS

Oracle JDK 22 (64 bit) is installed (rpm)

Oracle Java JDK 22 is installed (dpkg)

Windows rndismp6.sys Remote Code Execution Vulnerability. An unauthenticated attacker needs to physically connect a specially crafted USB device to exploit this vulnerability.


Pages:      Start    1378    1379    1380    1381    1382    1383    1384    1385    1386    1387    1388    ..   1388

© SecPod Technologies