Skip to content

SHDRGET*() macros integer overflow

Low
jbech-linaro published GHSA-46wf-g884-hx98 Jun 28, 2021

Package

OP-TEE

Affected versions

< 3.6.0

Patched versions

>= 3.6.0

Description

The SHDR_GET_SIZE(), SHDR_GET_HASH() and SHDR_GET_SIG() macros could overflow depending on given x and associated hash_size, sig_size values.

Note, no other attack path than the ones reported by Riscure (not using keyword return when checking img_size and shdr_size) are identified to exploit this overflow, however it is error prone and could lead to a future vulnerability.

Patches

optee_os.git

  • core: add VA overflow check in shdr_alloc_and_copy() (062765e)

Workarounds

N/A

References

N/A

OP-TEE ID

OP-TEE-2019-0012

Reported by

Netflix (Bastien Simondi)

For more information

For more information regarding the security incident process in OP-TEE, please read the information that can be found when going to the "Security" page at https://www.trustedfirmware.org.

Severity

Low

CVE ID

No known CVE

Weaknesses

No CWEs