93 known vulnerabilities · sorted by CVSS score
Memory Corruption in Multi-mode Call Processor while processing bit mask API.
Memory corruption in Core while processing control functions.
Memory corruption in TZ Secure OS while Tunnel Invoke Manager initialization.
Memory corruption due to double free in core while initializing the encryption key.
Memory corruption in TZ Secure OS while requesting a memory allocation from TA region.
Memory corruption due to buffer copy without checking the size of input in Core while sending SCM command to get write protection information.
Memory corruption in HLOS while running playready use-case.
Memory corruption due to integer overflow or wraparound in Core while DDR memory assignment.
Cryptographic issue while performing attach with a LTE network, a rogue base station can skip the authentication phase and immediately send the Security Mode Command.
Memory corruption while configuring a Hypervisor based input virtual device.
Improper Access to the VM resource manager can lead to Memory Corruption.
Memory corruption in Audio while processing RT proxy port register driver.
Memory Corruption in Core due to secure memory access by user while loading modem image.
Memory corruption in Graphics Linux while assigning shared virtual memory region during IOCTL call.
Memory corruption while processing finish_sign command to pass a rsp buffer.
Memory corruption in Graphics while importing a file.
Memory corruption in WLAN HAL while processing WMI-UTF command or FTM TLV1 command.
Memory corruption due to integer overflow or wraparound in WLAN while sending WMI cmd from host to target.
Memory corruption while Configuring the SMR/S2CR register in Bypass mode.
Memory corruption when there is failed unmap operation in GPU.