2024-04-05 18:03:23
Google_Devices
PUBLISHED
Due to length check, an attacker with privilege access on a Linux Nonsecure operating system can trigger a vulnerability and leak the secure memory from the Trusted Application