During the secure boot, bl2 (the second stage of
the bootloader) loops over images defined in the table “bl2_mem_params_descs”.
For each image, the bl2 reads the image length and destination from the image’s
certificate. Because of the way of reading from the image, which base on 32-bit unsigned integer value, it can result to an integer overflow. An attacker can bypass memory range restriction and write data out of buffer bounds, which could result in bypass of secure boot.
Affected git version from c2f286820471ed276c57e603762bd831873e5a17 until (not
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://asrg.io/security-advisories/CVE-2024-1633/ |
![]() ![]() ![]() |
History
Fri, 24 Jan 2025 15:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Renesas
Renesas arm-trusted-firmware Renesas r-car D3e Renesas r-car E3e Renesas r-car H3e Renesas r-car H3ne Renesas r-car M3e Renesas r-car M3ne Renesas r-car V3h Renesas r-car V3h2 Renesas r-car V3m |
|
CPEs | cpe:2.3:h:renesas:r-car_d3e:-:*:*:*:*:*:*:* cpe:2.3:h:renesas:r-car_e3e:-:*:*:*:*:*:*:* cpe:2.3:h:renesas:r-car_h3e:-:*:*:*:*:*:*:* cpe:2.3:h:renesas:r-car_h3ne:-:*:*:*:*:*:*:* cpe:2.3:h:renesas:r-car_m3e:-:*:*:*:*:*:*:* cpe:2.3:h:renesas:r-car_m3ne:-:*:*:*:*:*:*:* cpe:2.3:h:renesas:r-car_v3h2:-:*:*:*:*:*:*:* cpe:2.3:h:renesas:r-car_v3h:-:*:*:*:*:*:*:* cpe:2.3:h:renesas:r-car_v3m:-:*:*:*:*:*:*:* cpe:2.3:o:renesas:arm-trusted-firmware:rcar_gen3_2.5:*:*:*:*:*:*:* |
|
Vendors & Products |
Renesas
Renesas arm-trusted-firmware Renesas r-car D3e Renesas r-car E3e Renesas r-car H3e Renesas r-car H3ne Renesas r-car M3e Renesas r-car M3ne Renesas r-car V3h Renesas r-car V3h2 Renesas r-car V3m |

Status: PUBLISHED
Assigner: ASRG
Published:
Updated: 2024-08-01T18:48:20.650Z
Reserved: 2024-02-19T16:36:31.290Z
Link: CVE-2024-1633

Updated: 2024-08-01T18:48:20.650Z

Status : Analyzed
Published: 2024-02-19T17:15:08.347
Modified: 2025-01-24T15:21:06.727
Link: CVE-2024-1633

No data.