Security Vulnerabilities
- CVEs Published In January 2026
Memory corruption when copying overlapping buffers during memory operations due to incorrect offset calculations.
Transient DOS while parsing a WLAN management frame with a Vendor Specific Information Element.
Memory corruption occurs when a secure application is launched on a device with insufficient memory.
The Uniffle HTTP client is configured to trust all SSL certificates and
disables hostname verification by default. This insecure configuration
exposes all REST API communication between the Uniffle CLI/client and the
Uniffle Coordinator service to potential Man-in-the-Middle (MITM) attacks.
This issue affects all versions from before 0.10.0.
Users are recommended to upgrade to version 0.10.0, which fixes the issue.
Cryptographic issue may occur while encrypting license data.
Memory corruption while processing a secure logging command in the trusted application.
Memory corruption while processing identity credential operations in the trusted application.
Memory Corruption when multiple threads concurrently access and modify shared resources.
Information disclosure when a weak hashed value is returned to userland code in response to a IOCTL call to obtain a session ID.
Memory corruption while preprocessing IOCTLs in sensors.