In Arm software implementing the Armv8-M processors (all versions), the stack selection mechanism could be influenced by a stack-underflow attack in v8-M TrustZone based processors. An attacker can cause a change to the stack pointer used by the Secure World from a non-secure application if the stack is not initialized. This vulnerability affects only the software that is based on Armv8-M processors with the Security Extension.
References
Link | Resource |
---|---|
https://developer.arm.com/support/arm-security-updates/armv8-m-stack-sealing | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2020-11-12T18:53:45
Updated: 2020-11-12T18:53:45
Reserved: 2020-08-03T00:00:00
Link: CVE-2020-16273
JSON object: View
NVD Information
Status : Analyzed
Published: 2020-11-12T19:15:14.583
Modified: 2020-12-01T19:37:45.247
Link: CVE-2020-16273
JSON object: View
Redhat Information
No data.
CWE