In Arm software implementing the Armv8-M processors (all versions), the stack selection mechanism could be influenced by a stack-underflow attack in v8-M TrustZone based processors. An attacker can cause a change to the stack pointer used by the Secure World from a non-secure application if the stack is not initialized. This vulnerability affects only the software that is based on Armv8-M processors with the Security Extension.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2020-11-12T18:53:45
Updated: 2024-08-04T13:37:54.222Z
Reserved: 2020-08-03T00:00:00
Link: CVE-2020-16273
Vulnrichment
No data.
NVD
Status : Modified
Published: 2020-11-12T19:15:14.583
Modified: 2024-11-21T05:07:04.670
Link: CVE-2020-16273
Redhat
No data.