Google

Android

7918 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.06%
  • Veröffentlicht 16.05.2017 14:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

In TrustZone an integer overflow vulnerability can potentially occur in all Android releases from CAF using the Linux kernel.

  • EPSS 0.05%
  • Veröffentlicht 16.05.2017 14:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

In TrustZone a time-of-check time-of-use race condition could potentially exist in a QFPROM routine in all Android releases from CAF using the Linux kernel.

  • EPSS 0.05%
  • Veröffentlicht 16.05.2017 14:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

In TrustZone a time-of-check time-of-use race condition could potentially exist in a listener routine in all Android releases from CAF using the Linux kernel.

  • EPSS 0.06%
  • Veröffentlicht 16.05.2017 14:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

In TrustZone an integer overflow vulnerability can potentially occur in all Android releases from CAF using the Linux kernel.

  • EPSS 0.06%
  • Veröffentlicht 16.05.2017 14:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

In TrustZone a buffer overflow vulnerability can potentially occur in all Android releases from CAF using the Linux kernel while loading an ELF file.

  • EPSS 0.06%
  • Veröffentlicht 16.05.2017 14:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

In TrustZone an untrusted pointer dereference vulnerability can potentially occur in a DRM routine in all Android releases from CAF using the Linux kernel.

  • EPSS 0.03%
  • Veröffentlicht 12.05.2017 20:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

In core_info_read and inst_info_read in all Android releases from CAF using the Linux kernel, variable "dbg_buf", "dbg_buf->curr" and "dbg_buf->filled_size" could be modified by different threads at the same time, but they are not protected with mute...

  • EPSS 0.04%
  • Veröffentlicht 12.05.2017 20:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

In all Android releases from CAF using the Linux kernel, while processing a voice SVC request which is nonstandard by specifying a payload size that will overflow its own declared size, an out of bounds memory copy occurs.

  • EPSS 0.03%
  • Veröffentlicht 12.05.2017 20:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

In function msm_pcm_playback_close() in all Android releases from CAF using the Linux kernel, prtd is assigned substream->runtime->private_data. Later, prtd is freed. However, prtd is not sanitized and set to NULL, resulting in a dangling pointer. Th...

  • EPSS 0.05%
  • Veröffentlicht 12.05.2017 15:29:02
  • Zuletzt bearbeitet 20.04.2025 01:37:25

An elevation of privilege vulnerability in the MediaTek power driver could enable a local malicious application to execute arbitrary code within the context of the kernel. This issue is rated as High because it first requires compromising a privilege...