Логотип exploitDog
bind:CVE-2021-34387
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2021-34387

Количество 2

Количество 2

nvd логотип

CVE-2021-34387

больше 4 лет назад

The ARM TrustZone Technology on which Trusty is based on contains a vulnerability in access permission settings where the portion of the DRAM reserved for TrustZone is identity-mapped by TLK with read, write, and execute permissions, which gives write access to kernel code and data that is otherwise mapped read only.

CVSS3: 6.3
EPSS: Низкий
github логотип

GHSA-89wh-w7hc-jhpc

больше 3 лет назад

The ARM TrustZone Technology on which Trusty is based on contains a vulnerability in access permission settings where the portion of the DRAM reserved for TrustZone is identity-mapped by TLK with read, write, and execute permissions, which gives write access to kernel code and data that is otherwise mapped read only.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2021-34387

The ARM TrustZone Technology on which Trusty is based on contains a vulnerability in access permission settings where the portion of the DRAM reserved for TrustZone is identity-mapped by TLK with read, write, and execute permissions, which gives write access to kernel code and data that is otherwise mapped read only.

CVSS3: 6.3
0%
Низкий
больше 4 лет назад
github логотип
GHSA-89wh-w7hc-jhpc

The ARM TrustZone Technology on which Trusty is based on contains a vulnerability in access permission settings where the portion of the DRAM reserved for TrustZone is identity-mapped by TLK with read, write, and execute permissions, which gives write access to kernel code and data that is otherwise mapped read only.

0%
Низкий
больше 3 лет назад

Уязвимостей на страницу