In Arm software implementing the Armv8-M processors (all versions), the stack selection mechanism could be influenced by a stack-underflow attack in v8-M TrustZone based processors. An attacker can cause a change to the stack pointer used by the Secure World from a non-secure application if the stack is not initialized. This vulnerability affects only the software that is based on Armv8-M processors with the Security Extension.
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: mitre

Published: 2020-11-12T18:53:45

Updated: 2020-11-12T18:53:45

Reserved: 2020-08-03T00:00:00


Link: CVE-2020-16273

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2020-11-12T19:15:14.583

Modified: 2020-12-01T19:37:45.247


Link: CVE-2020-16273

JSON object: View

cve-icon Redhat Information

No data.

CWE