32 known vulnerabilities · sorted by CVSS score
Memory corruption in TZ Secure OS while Tunnel Invoke Manager initialization.
Memory corruption in Core Services while executing the command for removing a single event listener.
Cryptographic issue while performing attach with a LTE network, a rogue base station can skip the authentication phase and immediately send the Security Mode Command.
Memory corruption while configuring a Hypervisor based input virtual device.
Memory corruption when there is failed unmap operation in GPU.
Memory corruption in SPS Application while requesting for public key in sorter TA.
Memory corruption while processing finish_sign command to pass a rsp buffer.
Memory corruption in Audio while processing RT proxy port register driver.
Memory corruption while loading a VM from a signed VM image that is not coherent in the processor cache.
Memory corruption when two threads try to map and unmap a single node simultaneously.
Information disclosure while decoding this RTP packet Payload when UE receives the RTP packet from the network.
Memory corruption when the payload received from firmware is not as per the expected protocol size.
Memory corruption while processing video packets received from video firmware.
Memory corruption while processing buffer initialization, when trusted report for certain report types are generated.
Memory corruption while retrieving the CBOR data from TA.
Memory corruption during memory assignment to headless peripheral VM due to incorrect error code handling.
Memory corruption while copying a keyblob`s material when the key material`s size is not accurately checked.
Memory corruption when user provides data for FM HCI command control operations.
Memory corruption during memory mapping into protected VM address space due to incorrect API restrictions.
Memory corruption while reading secure file.