296,748
Total vulnerabilities in the database
The ARM TrustZone Technology on which Trusty is based on contains a vulnerability in access permission settings where the portion of the DRAM reserved for TrustZone is identity-mapped by TLK with read, write, and execute permissions, which gives write access to kernel code and data that is otherwise mapped read only.
| Software | From | Fixed in |
|---|---|---|
| nvidia / jetson_linux | - | 32.5.1 |