Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
OP-TEE: RSASSA EMSA- PKCS1-v1_5 underflow in emsa_pkcs1_v1_5_encode()
Vulnerability Description
OP-TEE is a Trusted Execution Environment (TEE) designed as companion to a non-secure Linux kernel running on Arm; Cortex-A cores using the TrustZone technology. From 3.8.0 to 4.10, in the function emsa_pkcs1_v1_5_encode() in core/drivers/crypto/crypto_api/acipher/rsassa.c, the amount of padding needed, "PS size", is calculated by subtracting the size of the digest and other fields required for the EMA-PKCS1-v1_5 encoding from the size of the modulus of the key. By selecting a small enough modulus, this subtraction can overflow. The padding is added as a string of 0xFF bytes with a call to memset(), and an underflowed integer will cause the memset() call to overwrite until OP-TEE crashes. This only affects platforms registering RSA acceleration.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Vulnerability Type
整数溢出或超界折返
Vulnerability Title
OP-TEE Trusted OS 输入验证错误漏洞
Vulnerability Description
OP-TEE Trusted OS是OP-TEE开源的一个实现 Arm TrustZone 技术的开源可信执行环境(TEE)。 OP-TEE Trusted OS 3.8.0版本至4.10版本存在输入验证错误漏洞,该漏洞源于emsa_pkcs1_v1_5_encode()函数中填充大小计算可能溢出,导致memset()调用覆盖内存直至OP-TEE崩溃。
CVSS Information
N/A
Vulnerability Type
N/A