Skip to content

Integer overflow could lead to too large num_syms and rel_end during relocation process

Moderate
jbech-linaro published GHSA-23fc-35w7-c5v2 Jun 28, 2021

Package

OP-TEE

Affected versions

< 3.6.0

Patched versions

>= 3.6.0

Description

shdr[sym_tab_idx].sh_addr + shdr[sym_tab_idx].sh_size and shdr[rel_sidx].sh_addr + shdr[rel_sidx].sh_size could overflow, resulting in a large num_syms, or an invalid rel_end. Both could be used to access beyond legitimate memory. Outcome of such flaw is unclear but could be used to snoop or alter memory.

Patches

optee_os.git

  • core: ELF relocation: use ADD_OVERFLOW() (781c8f0)

Workarounds

N/A

References

N/A

OP-TEE ID

OP-TEE-2019-0015

Reported by

Netflix (Bastien Simondi)

For more information

For more information regarding the security incident process in OP-TEE, please read the information that can be found when going to the "Security" page at https://www.trustedfirmware.org.

Severity

Moderate

CVE ID

No known CVE

Weaknesses

No CWEs