Source: optee-os
Version: 4.5.0-1
Severity: grave
Tags: security upstream
X-Debbugs-Cc: [email protected], Debian Security Team <[email protected]>

Hi,

The following vulnerability was published for optee-os.

CVE-2025-46733[0]:
| OP-TEE is a Trusted Execution Environment (TEE) designed as
| companion to a non-secure Linux kernel running on Arm; Cortex-A
| cores using the TrustZone technology. In version 4.5.0, using a
| specially crafted tee-supplicant binary running in REE userspace, an
| attacker can trigger a panic in a TA that uses the libutee Secure
| Storage API. Many functions in libutee, specifically those which
| make up the Secure Storage API, will panic if a system call returns
| an unexpected return code. This behavior is mandated by the TEE
| Internal Core API specification. However, in OP-TEE’s
| implementation, return codes of secure storage operations are passed
| through unsanitized from the REE tee-supplicant, through the Linux
| kernel tee-driver, through the OP-TEE kernel, back to libutee. Thus,
| an attacker with access to REE userspace, and the ability to stop
| tee-supplicant and replace it with their own process (generally
| trivial for a root user, and depending on the way permissions are
| set up, potentially available even to less privileged users) can run
| a malicious tee-supplicant process that responds to storage requests
| with unexpected response codes, triggering a panic in the requesting
| TA. This is particularly dangerous for TAs built with
| `TA_FLAG_SINGLE_INSTANCE` (corresponding to `gpd.ta.singleInstance`
| and `TA_FLAG_INSTANCE_KEEP_ALIVE` (corresponding to
| `gpd.ta.keepAlive`). The behavior of these TAs may depend on memory
| that is preserved between sessions, and the ability of an attacker
| to panic the TA and reload it with a clean memory space can
| compromise the behavior of those TAs. A critical example of this is
| the optee_ftpm TA. It uses the kept alive memory to hold PCR values,
| which crucially must be non-resettable. An attacker who can trigger
| a panic in the fTPM TA can reset the PCRs, and then extend them PCRs
| with whatever they choose, falsifying boot measurements, accessing
| sealed data, and potentially more. The impact of this issue depends
| significantly on the behavior of affected TAs. For some, it could
| manifest as a denial of service, while for others, like the fTPM TA,
| it can result in the disclosure of sensitive data. Anyone running
| the fTPM TA is affected, but similar attacks may be possible on
| other TAs that leverage the Secure Storage API. A fix is available
| in commit 941a58d78c99c4754fbd4ec3079ec9e1d596af8f.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2025-46733
    https://www.cve.org/CVERecord?id=CVE-2025-46733
[1] https://github.com/OP-TEE/optee_os/security/advisories/GHSA-f35r-hm2m-p6c3
[2] 
https://github.com/OP-TEE/optee_os/commit/941a58d78c99c4754fbd4ec3079ec9e1d596af8f

Regards,
Salvatore

Reply via email to