In Arm software implementing the Armv8-M processors (all versions), the stack selection mechanism could be influenced by a stack-underflow attack in v8-M TrustZone based processors. An attacker can cause a change to the stack pointer used by the Secure World from a non-secure application if the stack is not initialized. This vulnerability affects only the software that is based on Armv8-M processors with the Security Extension.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2020-11-12T18:53:45

Updated: 2024-08-04T13:37:54.222Z

Reserved: 2020-08-03T00:00:00

Link: CVE-2020-16273

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-11-12T19:15:14.583

Modified: 2024-11-21T05:07:04.670

Link: CVE-2020-16273

cve-icon Redhat

No data.