CVE-2026-33662

OP-TEE is a Trusted Execution Environment (TEE) designed as companion to a non-secure Linux kernel running on Arm; Cortex-A cores using the TrustZone technology. From 3.8.0 to 4.10, in the function emsa_pkcs1_v1_5_encode() in core/drivers/crypto/crypto_api/acipher/rsassa.c, the amount of padding needed, "PS size", is calculated by subtracting the size of the digest and other fields required for the EMA-PKCS1-v1_5 encoding from the size of the modulus of the key. By selecting a small enough modulus, this subtraction can overflow. The padding is added as a string of 0xFF bytes with a call to memset(), and an underflowed integer will cause the memset() call to overwrite until OP-TEE crashes. This only affects platforms registering RSA acceleration.
Configurations

No configuration.

History

24 Apr 2026, 19:17

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-24 19:17

Updated : 2026-04-24 19:17


NVD link : CVE-2026-33662

Mitre link : CVE-2026-33662

CVE.ORG link : CVE-2026-33662


JSON object : View

Products Affected

No product.

CWE
CWE-190

Integer Overflow or Wraparound