Buffer overflow in "rcar_dev_init" due to using due to using untrusted data (rcar_image_number) as a loop counter before verifying it against RCAR_MAX_BL3X_IMAGE. This could lead to a full bypass of secure boot.
References
Link | Resource |
---|---|
https://asrg.io/security-advisories/cve-2024-6564/ | Third Party Advisory |
https://github.com/renesas-rcar/arm-trusted-firmware/commit/c9fb3558410032d2660c7f3b7d4b87dec09fe2f2 | Patch |
Configurations
History
No history.
Information
Published : 2024-07-08 16:15
Updated : 2024-07-09 14:19
NVD link : CVE-2024-6564
Mitre link : CVE-2024-6564
CVE.ORG link : CVE-2024-6564
JSON object : View
Products Affected
rensas
- arm-trusted-firmware
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')