Op-tee

Op-tee Os

5 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.09%
  • Veröffentlicht 24.04.2026 18:13:28
  • Zuletzt bearbeitet 28.04.2026 15:48:13

OP-TEE is a Trusted Execution Environment (TEE) designed as companion to a non-secure Linux kernel running on Arm; Cortex-A cores using the TrustZone technology. From 3.8.0 to 4.10, in the function emsa_pkcs1_v1_5_encode() in core/drivers/crypto/cryp...

Exploit
  • EPSS 0.01%
  • Veröffentlicht 24.04.2026 02:20:55
  • Zuletzt bearbeitet 27.04.2026 14:50:13

OP-TEE is a Trusted Execution Environment (TEE) designed as companion to a non-secure Linux kernel running on Arm; Cortex-A cores using the TrustZone technology. In versions 3.13.0 through 4.10.0, missing checks in `entry_get_attribute_value()` in `...

  • EPSS 0.08%
  • Veröffentlicht 04.07.2025 13:13:53
  • Zuletzt bearbeitet 15.04.2026 00:35:42

OP-TEE is a Trusted Execution Environment (TEE) designed as companion to a non-secure Linux kernel running on Arm; Cortex-A cores using the TrustZone technology. In version 4.5.0, using a specially crafted tee-supplicant binary running in REE userspa...

Exploit
  • EPSS 0.32%
  • Veröffentlicht 29.11.2022 17:15:11
  • Zuletzt bearbeitet 21.11.2024 07:30:12

OP-TEE Trusted OS is the secure side implementation of OP-TEE project, a Trusted Execution Environment. Versions prior to 3.19.0, contain an Improper Validation of Array Index vulnerability. The function `cleanup_shm_refs()` is called by both `entry_...

  • EPSS 0.15%
  • Veröffentlicht 13.02.2017 18:59:00
  • Zuletzt bearbeitet 13.05.2026 00:24:29

The rsa_verify_hash_ex function in rsa_verify_hash.c in LibTomCrypt, as used in OP-TEE before 2.2.0, does not validate that the message length is equal to the ASN.1 encoded data length, which makes it easier for remote attackers to forge RSA signatur...