The ARM TrustZone Technology on which Trusty is based on contains a vulnerability in access permission settings where the portion of the DRAM reserved for TrustZone is identity-mapped by TLK with read, write, and execute permissions, which gives write access to kernel code and data that is otherwise mapped read only.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-21045 | The ARM TrustZone Technology on which Trusty is based on contains a vulnerability in access permission settings where the portion of the DRAM reserved for TrustZone is identity-mapped by TLK with read, write, and execute permissions, which gives write access to kernel code and data that is otherwise mapped read only. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://nvidia.custhelp.com/app/answers/detail/a_id/5205 |
|
History
No history.
Status: PUBLISHED
Assigner: nvidia
Published:
Updated: 2024-08-04T00:12:49.990Z
Reserved: 2021-06-09T00:00:00.000Z
Link: CVE-2021-34387
No data.
Status : Modified
Published: 2021-06-21T22:15:07.673
Modified: 2024-11-21T06:10:17.500
Link: CVE-2021-34387
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD