11 known vulnerabilities · sorted by CVSS score
Memory Corruption when adding user-supplied data without checking available buffer space.
Memory Corruption while invoking IOCTL calls when concurrent access to shared buffer occurs.
Memory Corruption when concurrent access to shared buffer occurs due to improper synchronization between assignment and deallocation of buffer resources.
Memory Corruption when concurrent access to shared buffer occurs during IOCTL calls.
Memory Corruption when accessing trusted execution environment without proper privilege check.
Memory Corruption when accessing buffers with invalid length during TA invocation.
Memory Corruption when accessing a buffer after it has been freed while processing IOCTL calls.
Memory corruption while handling different IOCTL calls from the user-space simultaneously.
Memory corruption while using alignments for memory allocation.
Weak configuration may lead to cryptographic issue when a VoWiFi call is triggered from UE.
Transient DOS when an LTE RLC packet with invalid TB is received by UE.