Lucene search

K
prionPRIOn knowledge basePRION:CVE-2022-25334
HistoryOct 19, 2023 - 10:15 a.m.

Stack overflow

2023-10-1910:15:00
PRIOn knowledge base
www.prio-n.com
6
texas instruments omap
tee
bounds check vulnerability
sk_load module
stack overflow
secure kernel data
arbitrary code execution
sha256 function pointer
cek
cve-2022-25332
tee security architecture.

6.7 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.0%

The Texas Instruments OMAP L138 (secure variants) trusted execution environment (TEE) lacks a bounds check on the signature size field in the SK_LOAD module loading routine, present in mask ROM. A module with a sufficiently large signature field causes a stack overflow, affecting secure kernel data pages. This can be leveraged to obtain arbitrary code execution in secure supervisor context by overwriting a SHA256 function pointer in the secure kernel data area when loading a forged, unsigned SK_LOAD module encrypted with the CEK (obtainable through CVE-2022-25332). This constitutes a full break of the TEE security architecture.

References

6.7 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.0%

Related for PRION:CVE-2022-25334