CVE-2026-33662
- EPSS 0.09%
- Veröffentlicht 24.04.2026 18:13:28
- Zuletzt bearbeitet 28.04.2026 15:48:13
OP-TEE is a Trusted Execution Environment (TEE) designed as companion to a non-secure Linux kernel running on Arm; Cortex-A cores using the TrustZone technology. From 3.8.0 to 4.10, in the function emsa_pkcs1_v1_5_encode() in core/drivers/crypto/cryp...
CVE-2026-33317
- EPSS 0.01%
- Veröffentlicht 24.04.2026 02:20:55
- Zuletzt bearbeitet 27.04.2026 14:50:13
OP-TEE is a Trusted Execution Environment (TEE) designed as companion to a non-secure Linux kernel running on Arm; Cortex-A cores using the TrustZone technology. In versions 3.13.0 through 4.10.0, missing checks in `entry_get_attribute_value()` in `...
CVE-2025-46733
- EPSS 0.08%
- Veröffentlicht 04.07.2025 13:13:53
- Zuletzt bearbeitet 15.04.2026 00:35:42
OP-TEE is a Trusted Execution Environment (TEE) designed as companion to a non-secure Linux kernel running on Arm; Cortex-A cores using the TrustZone technology. In version 4.5.0, using a specially crafted tee-supplicant binary running in REE userspa...
CVE-2022-46152
- EPSS 0.32%
- Veröffentlicht 29.11.2022 17:15:11
- Zuletzt bearbeitet 21.11.2024 07:30:12
OP-TEE Trusted OS is the secure side implementation of OP-TEE project, a Trusted Execution Environment. Versions prior to 3.19.0, contain an Improper Validation of Array Index vulnerability. The function `cleanup_shm_refs()` is called by both `entry_...
CVE-2016-6129
- EPSS 0.15%
- Veröffentlicht 13.02.2017 18:59:00
- Zuletzt bearbeitet 13.05.2026 00:24:29
The rsa_verify_hash_ex function in rsa_verify_hash.c in LibTomCrypt, as used in OP-TEE before 2.2.0, does not validate that the message length is equal to the ASN.1 encoded data length, which makes it easier for remote attackers to forge RSA signatur...