CVE-2024-6564

NameCVE-2024-6564
DescriptionBuffer overflow in "rcar_dev_init" due to using due to using untrusted data (rcar_image_number) as a loop counter before verifying it against RCAR_MAX_BL3X_IMAGE. This could lead to a full bypass of secure boot.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs1076042

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
arm-trusted-firmware (PTS)buster2.0+290.98aab974-2vulnerable
bullseye2.4+dfsg-2vulnerable
bookworm2.8.0+dfsg-1vulnerable
sid, trixie2.10.0+dfsg-1vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
arm-trusted-firmwaresourcebuster(unfixed)end-of-life
arm-trusted-firmwaresource(unstable)(unfixed)1076042

Notes

[bookworm] - arm-trusted-firmware <no-dsa> (Minor issue)
[bullseye] - arm-trusted-firmware <no-dsa> (Minor issue)
https://github.com/renesas-rcar/arm-trusted-firmware/commit/c9fb3558410032d2660c7f3b7d4b87dec09fe2f2
https://asrg.io/security-advisories/cve-2024-6564/

Search for package or bug name: Reporting problems