Memory corruption when an invoke call and a TEE call are bound for the same trusted application.
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
The product writes data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://docs.qualcomm.com/product/publicresources/securitybulletin/july-2024-bulletin.html | vendor advisory |