Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
OP-TEE: PKCS#11 TA out-of-bounds read and memory disclosure
Vulnerability Description
OP-TEE is a Trusted Execution Environment (TEE) designed as companion to a non-secure Linux kernel running on Arm; Cortex-A cores using the TrustZone technology. In versions 3.13.0 through 4.10.0, missing checks in `entry_get_attribute_value()` in `ta/pkcs11/src/object.c` can lead to out-of-bounds read from the PKCS#11 TA heap or a crash. When chained with the OOB read, the PKCS#11 TA function `PKCS11_CMD_GET_ATTRIBUTE_VALUE` or `entry_get_attribute_value()` can, with a bad template parameter, be tricked into reading at most 7 bytes beyond the end of the template buffer and writing beyond the end of the template buffer with the content of an attribute value of a PKCS#11 object. Commits e031c4e562023fd9f199e39fd2e85797e4cbdca9, 16926d5a46934c46e6656246b4fc18385a246900, and 149e8d7ecc4ef8bb00ab4a37fd2ccede6d79e1ca contain patches and are anticipated to be part of version 4.11.0.
CVSS Information
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:L
Vulnerability Type
跨界内存读
Vulnerability Title
OP-TEE Trusted OS 缓冲区错误漏洞
Vulnerability Description
OP-TEE Trusted OS是OP-TEE开源的一个实现 Arm TrustZone 技术的开源可信执行环境(TEE)。 OP-TEE Trusted OS 3.13.0版本至4.10.0版本存在缓冲区错误漏洞,该漏洞源于entry_get_attribute_value()函数中缺少检查,可能导致PKCS#11 TA堆越界读取或崩溃。
CVSS Information
N/A
Vulnerability Type
N/A