Buffer overflow in "rcar_dev_init" due to using due to using untrusted data (rcar_image_number) as a loop counter before verifying it against RCAR_MAX_BL3X_IMAGE. This could lead to a full bypass of secure boot.
References
Link | Resource |
---|---|
https://asrg.io/security-advisories/cve-2024-6564/ | Third Party Advisory |
https://github.com/renesas-rcar/arm-trusted-firmware/commit/c9fb3558410032d2660c7f3b7d4b87dec09fe2f2 | Patch |
Configurations
History
22 Aug 2024, 15:52
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:renesas:arm-trusted-firmware:-:*:*:*:*:*:*:* | |
First Time |
Renesas
Renesas arm-trusted-firmware |
09 Jul 2024, 14:19
Type | Values Removed | Values Added |
---|---|---|
References | () https://asrg.io/security-advisories/cve-2024-6564/ - Third Party Advisory | |
References | () https://github.com/renesas-rcar/arm-trusted-firmware/commit/c9fb3558410032d2660c7f3b7d4b87dec09fe2f2 - Patch | |
Summary |
|
|
First Time |
Rensas arm-trusted-firmware
Rensas |
|
CPE | cpe:2.3:o:rensas:arm-trusted-firmware:-:*:*:*:*:*:*:* |
08 Jul 2024, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-07-08 16:15
Updated : 2024-08-22 15:52
NVD link : CVE-2024-6564
Mitre link : CVE-2024-6564
CVE.ORG link : CVE-2024-6564
JSON object : View
Products Affected
renesas
- arm-trusted-firmware
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')