Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 28 Apr 2026 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Op-tee
Op-tee op-tee Os |
|
| Vendors & Products |
Op-tee
Op-tee op-tee Os |
Mon, 27 Apr 2026 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Linaro
Linaro op-tee |
|
| CPEs | cpe:2.3:o:linaro:op-tee:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Linaro
Linaro op-tee |
Fri, 24 Apr 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 24 Apr 2026 02:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OP-TEE is a Trusted Execution Environment (TEE) designed as companion to a non-secure Linux kernel running on Arm; Cortex-A cores using the TrustZone technology. In versions 3.13.0 through 4.10.0, missing checks in `entry_get_attribute_value()` in `ta/pkcs11/src/object.c` can lead to out-of-bounds read from the PKCS#11 TA heap or a crash. When chained with the OOB read, the PKCS#11 TA function `PKCS11_CMD_GET_ATTRIBUTE_VALUE` or `entry_get_attribute_value()` can, with a bad template parameter, be tricked into reading at most 7 bytes beyond the end of the template buffer and writing beyond the end of the template buffer with the content of an attribute value of a PKCS#11 object. Commits e031c4e562023fd9f199e39fd2e85797e4cbdca9, 16926d5a46934c46e6656246b4fc18385a246900, and 149e8d7ecc4ef8bb00ab4a37fd2ccede6d79e1ca contain patches and are anticipated to be part of version 4.11.0. | |
| Title | OP-TEE: PKCS#11 TA out-of-bounds read and memory disclosure | |
| Weaknesses | CWE-125 CWE-787 |
|
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-24T18:18:04.912Z
Reserved: 2026-03-18T21:23:36.677Z
Link: CVE-2026-33317
Updated: 2026-04-24T17:20:10.513Z
Status : Analyzed
Published: 2026-04-24T03:16:11.020
Modified: 2026-04-27T14:50:13.087
Link: CVE-2026-33317
No data.
OpenCVE Enrichment
Updated: 2026-04-28T08:45:26Z