Security: OP-TEE/optee_os
Security
No security policy detected
This project has not set up a SECURITY.md file yet.
Report a vulnerability-
PKCS#11: DB PIN counter reset attackGHSA-2f5m-q4w3-865p published
Feb 2, 2024 by jbech-linaroLow -
Double free in shdr_verify_signatureGHSA-jrw7-63cq-7vhm published
Sep 13, 2023 by jbech-linaroHigh -
Improper Validation of Array Index in the cleanup_shm_refs functionGHSA-65w8-6mrg-52g7 published
Nov 29, 2022 by jbech-linaroHigh -
Bypass signature verification on Raspberry Pi3 using a glitch attackGHSA-r64m-h886-hw6g published
Nov 24, 2022 by jbech-linaroLow -
TrustZone bypass at wake up with default CSU configuration on NXP i.MX6ULGHSA-4pqr-q8rf-8464 published
Nov 23, 2021 by ruchi393Moderate -
RPC alloc could allocate smaller shared memory than requestedGHSA-5fhv-xcxv-8v5x published
Jan 11, 2022 by ruchi393Moderate -
Broadcom elog PTA - firmware loading issueGHSA-hhrc-h9xj-hppv published
Nov 10, 2021 by ruchi393Low -
Clarification to default CSU configuration state on some i.MX devicesGHSA-6q85-3ph3-rm47 published
Jul 12, 2021 by ruchi393Low -
Paged TAs mapping issueGHSA-5p5v-7hh8-6rfw published
May 10, 2021 by jbech-linaroModerate -
Replay Attack Vulnerabilities in RPMB Protocol ApplicationsGHSA-3hg3-f4rp-pr44 published
Jun 28, 2021 by jbech-linaroHigh
Learn more about advisories related to OP-TEE/optee_os in the GitHub Advisory Database