Op-Tee Os vulnerabilities
2 known vulnerabilities affecting op-tee/op-tee_os.
Total CVEs
2
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
HIGH2
Vulnerabilities
Page 1 of 1
CVE-2022-46152HIGHCVSS 8.8fixed in 3.19.02022-11-29
CVE-2022-46152 [HIGH] CWE-129 CVE-2022-46152: OP-TEE Trusted OS is the secure side implementation of OP-TEE project, a Trusted Execution Environme
OP-TEE Trusted OS is the secure side implementation of OP-TEE project, a Trusted Execution Environment. Versions prior to 3.19.0, contain an Improper Validation of Array Index vulnerability. The function `cleanup_shm_refs()` is called by both `entry_invoke_command()` and `entry_open_session()`. The commands `OPTEE_MSG_CMD_OPEN_SESSION` and `OPTEE_MSG_
nvd
CVE-2016-6129HIGHCVSS 7.5≤ 2.1.02017-02-13
CVE-2016-6129 [HIGH] CWE-20 CVE-2016-6129: The rsa_verify_hash_ex function in rsa_verify_hash.c in LibTomCrypt, as used in OP-TEE before 2.2.0,
The rsa_verify_hash_ex function in rsa_verify_hash.c in LibTomCrypt, as used in OP-TEE before 2.2.0, does not validate that the message length is equal to the ASN.1 encoded data length, which makes it easier for remote attackers to forge RSA signatures or public certificates by leveraging a Bleichenbacher signature forgery attack.
nvd