4 known vulnerabilities · sorted by CVSS score
Memory corruption while using alignments for memory allocation.
Memory Corruption when accessing buffers with invalid length during TA invocation.
Memory Corruption when adding user-supplied data without checking available buffer space.
Cryptographic Issue when a shared VM reference allows HLOS to boot loader and access cert chain.