Android Trusted OS Syscall Param Validation Vulnerability (CVE-2021-26381)
CVE-2021-26381 Published on February 10, 2026

Improper system call parameter validation in the Trusted OS may allow a malicious driver to perform mapping or unmapping operations on a large number of pages, potentially resulting in kernel memory corruption.

NVD

Weakness Type

Allocation of Resources Without Limits or Throttling

The software allocates a reusable resource or group of resources on behalf of an actor without imposing any restrictions on the size or number of resources that can be allocated, in violation of the intended security policy for that actor.


Products Associated with CVE-2021-26381

Want to know whenever a new CVE is published for Google Android? stack.watch will email you.

 

Affected Versions

AMD Ryzen™ Threadripper™ PRO 3000 WX-Series Processors: AMD Ryzen™ 5000 Series Desktop Processors with Radeon™ Graphics: AMD Ryzen™ Threadripper™ PRO 5000 WX-Series Processors: AMD Athlon™ 3000 Series Mobile Processors with Radeon™ Graphics: AMD Ryzen™ 5000 Series Mobile Processors with Radeon™ Graphics: AMD Ryzen™ 3000 Series Desktop Processors: AMD Ryzen™ 4000 Series Mobile Processors with Radeon™ Graphics: AMD Ryzen™ 4000 Series Desktop Processors: AMD Ryzen™ 5000 Series Desktop Processors: AMD Ryzen™ Embedded R1000 Series Processors: AMD Ryzen™ Embedded R2000 Series Processors: AMD Ryzen™ Embedded 5000 Series Processors: AMD Ryzen™ Embedded V1000 Series Processors (formerly codenamed "Raven Ridge"): AMD Ryzen™ Embedded V1000 Series Processors (formerly codenamed "Picasso"): AMD Ryzen™ Embedded V2000 Series Processors: AMD Ryzen™ Embedded V3000 Series Processors: AMD Radeon™ RX 5000 Series Graphics Products: AMD Radeon™ PRO W5000 Series Graphics Products: AMD Radeon™ PRO W6000 Series Graphics Products: AMD Radeon™ RX 6000 Series Graphics Products: AMD Radeon™ PRO V520: AMD Radeon™ PRO V620:

Exploit Probability

EPSS
0.01%
Percentile
0.73%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.