Debian Package Tracker
Register | Log in
Subscribe

optee-os

Choose email to subscribe with

general
  • source: optee-os (main)
  • version: 4.10.0-1
  • maintainer: Dylan Aïssi (DMD) (LowNMU)
  • arch: arm64
  • std-ver: 4.7.4
  • VCS: Git (Browse, QA)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • stable: 4.5.0-2
  • testing: 4.10.0-1
  • unstable: 4.10.0-1
versioned links
  • 4.5.0-2: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
  • 4.10.0-1: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • optee-os
  • optee-os-dev
action needed
Does not build reproducibly during testing normal
A package building reproducibly enables third parties to verify that the source matches the distributed binaries. It has been identified that this source package produced different results, failed to build or had other issues in a test environment. Please read about how to improve the situation!
Created: 2025-07-17 Last update: 2026-05-18 16:30
2 low-priority security issues in trixie low

There are 2 open security issues in trixie.

2 issues left for the package maintainer to handle:
  • CVE-2026-33317: (needs triaging) OP-TEE is a Trusted Execution Environment (TEE) designed as companion to a non-secure Linux kernel running on Arm; Cortex-A cores using the TrustZone technology. In versions 3.13.0 through 4.10.0, missing checks in `entry_get_attribute_value()` in `ta/pkcs11/src/object.c` can lead to out-of-bounds read from the PKCS#11 TA heap or a crash. When chained with the OOB read, the PKCS#11 TA function `PKCS11_CMD_GET_ATTRIBUTE_VALUE` or `entry_get_attribute_value()` can, with a bad template parameter, be tricked into reading at most 7 bytes beyond the end of the template buffer and writing beyond the end of the template buffer with the content of an attribute value of a PKCS#11 object. Commits e031c4e562023fd9f199e39fd2e85797e4cbdca9, 16926d5a46934c46e6656246b4fc18385a246900, and 149e8d7ecc4ef8bb00ab4a37fd2ccede6d79e1ca contain patches and are anticipated to be part of version 4.11.0.
  • CVE-2026-33662: (needs triaging) OP-TEE is a Trusted Execution Environment (TEE) designed as companion to a non-secure Linux kernel running on Arm; Cortex-A cores using the TrustZone technology. From 3.8.0 to 4.10, in the function emsa_pkcs1_v1_5_encode() in core/drivers/crypto/crypto_api/acipher/rsassa.c, the amount of padding needed, "PS size", is calculated by subtracting the size of the digest and other fields required for the EMA-PKCS1-v1_5 encoding from the size of the modulus of the key. By selecting a small enough modulus, this subtraction can overflow. The padding is added as a string of 0xFF bytes with a call to memset(), and an underflowed integer will cause the memset() call to overwrite until OP-TEE crashes. This only affects platforms registering RSA acceleration.

You can find information about how to handle these issues in the security team's documentation.

Created: 2026-04-25 Last update: 2026-05-11 06:34
news
[rss feed]
  • [2026-05-11] optee-os 4.10.0-1 MIGRATED to testing (Debian testing watch)
  • [2026-05-06] Accepted optee-os 4.10.0-1 (source) into unstable (Dylan Aïssi)
  • [2026-04-23] optee-os 4.9.0-1 MIGRATED to testing (Debian testing watch)
  • [2026-04-17] Accepted optee-os 4.9.0-1 (source) into unstable (Dylan Aïssi)
  • [2026-01-20] optee-os 4.8.0-1 MIGRATED to testing (Debian testing watch)
  • [2026-01-14] Accepted optee-os 4.8.0-1 (source) into unstable (Dylan Aïssi)
  • [2025-08-19] optee-os 4.7.0-1 MIGRATED to testing (Debian testing watch)
  • [2025-08-14] Accepted optee-os 4.7.0-1 (source) into unstable (Dylan Aïssi)
  • [2025-07-16] optee-os 4.5.0-2 MIGRATED to testing (Debian testing watch)
  • [2025-07-11] Accepted optee-os 4.5.0-2 (source) into unstable (Dylan Aïssi)
  • [2025-01-28] optee-os 4.5.0-1 MIGRATED to testing (Debian testing watch)
  • [2025-01-23] optee-os 4.4.0-1 MIGRATED to testing (Debian testing watch)
  • [2025-01-22] Accepted optee-os 4.5.0-1 (source) into unstable (Dylan Aïssi)
  • [2025-01-17] Accepted optee-os 4.4.0-1 (source) into unstable (Dylan Aïssi)
  • [2024-07-25] optee-os 4.3.0-1 MIGRATED to testing (Debian testing watch)
  • [2024-07-19] Accepted optee-os 4.3.0-1 (source) into unstable (Dylan Aïssi)
  • [2024-05-06] optee-os 4.2.0-3 MIGRATED to testing (Debian testing watch)
  • [2024-04-30] Accepted optee-os 4.2.0-3 (source) into unstable (Dylan Aïssi)
  • [2024-04-28] optee-os 4.2.0-1 MIGRATED to testing (Debian testing watch)
  • [2024-04-23] Accepted optee-os 4.2.0-2 (source arm64) into experimental (Debian FTP Masters) (signed by: Dylan Aïssi)
  • [2024-04-23] Accepted optee-os 4.2.0-1 (source) into unstable (Dylan Aïssi)
  • [2024-03-05] optee-os 4.1.0-2 MIGRATED to testing (Debian testing watch)
  • [2024-02-28] Accepted optee-os 4.1.0-2 (source) into unstable (Dylan Aïssi)
  • [2024-02-18] optee-os 4.1.0-1 MIGRATED to testing (Debian testing watch)
  • [2024-02-12] Accepted optee-os 4.1.0-1 (source) into unstable (Dylan Aïssi)
  • [2024-02-12] Accepted optee-os 4.0.0-1 (source arm64) into unstable (Debian FTP Masters) (signed by: Dylan Aïssi)
bugs [bug history graph]
  • all: 0
links
  • homepage
  • lintian
  • buildd: logs, reproducibility, cross
  • popcon
  • browse source code
  • other distros
  • security tracker
  • debian patches
ubuntu Ubuntu logo [Information about Ubuntu for Debian Developers]
  • version: 4.8.0-1

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing