1 results (0.003 seconds)

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

In Arm software implementing the Armv8-M processors (all versions), the stack selection mechanism could be influenced by a stack-underflow attack in v8-M TrustZone based processors. An attacker can cause a change to the stack pointer used by the Secure World from a non-secure application if the stack is not initialized. This vulnerability affects only the software that is based on Armv8-M processors with the Security Extension. En el software Arm que implementa los procesadores Armv8-M (todas las versiones), el mecanismo de selección de pila podría estar influenciado por un ataque de subdesbordamiento de pila en los procesadores basados ??en TrustZone v8-M. • https://developer.arm.com/support/arm-security-updates/armv8-m-stack-sealing • CWE-191: Integer Underflow (Wrap or Wraparound) •