Security: OP-TEE/optee_os
Security
No security policy detected
This project has not set up a SECURITY.md file yet.
Report a vulnerability-
REE userspace code can panic TAs, leading to fTPM PCR reset and data disclosureGHSA-f35r-hm2m-p6c3 published
Jul 4, 2025 by jforissierHigh -
PKCS#11: DB PIN counter reset attackGHSA-2f5m-q4w3-865p published
Feb 2, 2024 by jockebechLow -
Double free in shdr_verify_signatureGHSA-jrw7-63cq-7vhm published
Sep 13, 2023 by jockebechHigh -
Improper Validation of Array Index in the cleanup_shm_refs functionGHSA-65w8-6mrg-52g7 published
Nov 29, 2022 by jockebechHigh -
Bypass signature verification on Raspberry Pi3 using a glitch attackGHSA-r64m-h886-hw6g published
Nov 24, 2022 by jockebechLow -
TrustZone bypass at wake up with default CSU configuration on NXP i.MX6ULGHSA-4pqr-q8rf-8464 published
Nov 23, 2021 by ruchi393Moderate -
RPC alloc could allocate smaller shared memory than requestedGHSA-5fhv-xcxv-8v5x published
Jan 11, 2022 by ruchi393Moderate -
Broadcom elog PTA - firmware loading issueGHSA-hhrc-h9xj-hppv published
Nov 10, 2021 by ruchi393Low -
Clarification to default CSU configuration state on some i.MX devicesGHSA-6q85-3ph3-rm47 published
Jul 12, 2021 by ruchi393Low -
Paged TAs mapping issueGHSA-5p5v-7hh8-6rfw published
May 10, 2021 by jockebechModerate
Learn more about advisories related to OP-TEE/optee_os in the GitHub Advisory Database