32 known vulnerabilities · sorted by CVSS score
Cryptographic issue may occur while encrypting license data.
Memory corruption while deinitializing a HDCP session.
Memory corruption occurs when a secure application is launched on a device with insufficient memory.
Memory Corruption when adding user-supplied data without checking available buffer space.
Memory corruption when copying overlapping buffers during memory operations due to incorrect offset calculations.
Memory corruption while copying packets received from unix clients.
Memory Corruption while deallocating graphics processing unit memory buffers due to improper handling of memory pointers.
Memory corruption due to global buffer overflow when a test command uses an invalid payload type.
Memory corruption when user provides data for FM HCI command control operations.
Memory corruption while routing GPR packets between user and root when handling large data packet.
Memory Corruption when initiating GPU memory mapping using scatter-gather lists due to unchecked IOMMU mapping errors.
Memory corruption while using alignments for memory allocation.
Memory corruption when Alternative Frequency offset value is set to 255.
Memory Corruption when accessing trusted execution environment without proper privilege check.
Memory corruption while processing a secure logging command in the trusted application.
Memory corruption while passing pages to DSP with an unaligned starting address.
Memory Corruption when accessing buffers with invalid length during TA invocation.
Memory corruption while allocating buffers in DSP service.
Memory corruption while processing identity credential operations in the trusted application.
Memory corruption while rendering graphics using Adreno GPU drivers in Chrome.