Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-4j52-x36j-w2jw

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

In Arm software implementing the Armv8-M processors (all versions), the stack selection mechanism could be influenced by a stack-underflow attack in v8-M TrustZone based processors. An attacker can cause a change to the stack pointer used by the Secure World from a non-secure application if the stack is not initialized. This vulnerability affects only the software that is based on Armv8-M processors with the Security Extension.

In Arm software implementing the Armv8-M processors (all versions), the stack selection mechanism could be influenced by a stack-underflow attack in v8-M TrustZone based processors. An attacker can cause a change to the stack pointer used by the Secure World from a non-secure application if the stack is not initialized. This vulnerability affects only the software that is based on Armv8-M processors with the Security Extension.

EPSS

Процентиль: 20%
0.00063
Низкий

Дефекты

CWE-191

Связанные уязвимости

CVSS3: 7.8
nvd
около 5 лет назад

In Arm software implementing the Armv8-M processors (all versions), the stack selection mechanism could be influenced by a stack-underflow attack in v8-M TrustZone based processors. An attacker can cause a change to the stack pointer used by the Secure World from a non-secure application if the stack is not initialized. This vulnerability affects only the software that is based on Armv8-M processors with the Security Extension.

EPSS

Процентиль: 20%
0.00063
Низкий

Дефекты

CWE-191