5 known vulnerabilities · sorted by CVSS score
Memory corruption while using alignments for memory allocation.
Memory Corruption when accessing trusted execution environment without proper privilege check.
Memory Corruption when accessing buffers with invalid length during TA invocation.
Memory Corruption when adding user-supplied data without checking available buffer space.
Cryptographic Issue when a shared VM reference allows HLOS to boot loader and access cert chain.