27 known vulnerabilities · sorted by CVSS score
Cryptographic issue may occur while encrypting license data.
Memory corruption while deinitializing a HDCP session.
Memory corruption occurs when a secure application is launched on a device with insufficient memory.
Memory Corruption when adding user-supplied data without checking available buffer space.
Memory corruption while allocating buffers in DSP service.
Memory corruption while processing identity credential operations in the trusted application.
Memory corruption when copying overlapping buffers during memory operations due to incorrect offset calculations.
Memory corruption while copying packets received from unix clients.
Memory corruption due to global buffer overflow when a test command uses an invalid payload type.
Memory corruption while routing GPR packets between user and root when handling large data packet.
Memory corruption while using alignments for memory allocation.
Memory Corruption when accessing trusted execution environment without proper privilege check.
Memory corruption while processing a secure logging command in the trusted application.
Memory corruption while passing pages to DSP with an unaligned starting address.
Memory Corruption when accessing buffers with invalid length during TA invocation.
Memory corruption while rendering graphics using Adreno GPU drivers in Chrome.
Weak configuration may lead to cryptographic issue when a VoWiFi call is triggered from UE.
Memory corruption while processing a config call from userspace.
Memory corruption while processing shared command buffer packet between camera userspace and kernel.
Information disclosure while exposing internal TA-to-TA communication APIs to HLOS