23 known vulnerabilities · sorted by CVSS score
Memory corruption in Core Services while executing the command for removing a single event listener.
Memory corruption in TZ Secure OS while Tunnel Invoke Manager initialization.
Cryptographic issue while performing attach with a LTE network, a rogue base station can skip the authentication phase and immediately send the Security Mode Command.
Memory corruption while configuring a Hypervisor based input virtual device.
Memory corruption in SPS Application while requesting for public key in sorter TA.
Memory corruption when IOMMU unmap of a GPU buffer fails in Linux.
Memory corruption in Audio while processing RT proxy port register driver.
Memory corruption when there is failed unmap operation in GPU.
Memory corruption while processing finish_sign command to pass a rsp buffer.
Memory corruption while loading a VM from a signed VM image that is not coherent in the processor cache.
Information disclosure while decoding this RTP packet Payload when UE receives the RTP packet from the network.
Memory corruption while copying a keyblob`s material when the key material`s size is not accurately checked.
Memory corruption when user provides data for FM HCI command control operations.
Memory corruption while processing buffer initialization, when trusted report for certain report types are generated.
Memory corruption during memory mapping into protected VM address space due to incorrect API restrictions.
Memory corruption while processing a data structure, when an iterator is accessed after it has been removed, potential failures occur.
Memory corruption during memory assignment to headless peripheral VM due to incorrect error code handling.
Transient DOS while processing received beacon frame.
Transient DOS may occur while processing malformed length field in SSID IEs.
Memory corruption while parsing qcp clip with invalid chunk data size.