Name | CVE-2024-6564 |
Description | Buffer overflow in "rcar_dev_init" due to using due to using untrusted data (rcar_image_number) as a loop counter before verifying it against RCAR_MAX_BL3X_IMAGE. This could lead to a full bypass of secure boot. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Debian Bugs | 1076042 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
arm-trusted-firmware (PTS) | buster | 2.0+290.98aab974-2 | vulnerable |
| bullseye | 2.4+dfsg-2 | vulnerable |
| bookworm | 2.8.0+dfsg-1 | vulnerable |
| sid, trixie | 2.10.0+dfsg-1 | vulnerable |
The information below is based on the following data on fixed versions.
Notes
[bookworm] - arm-trusted-firmware <no-dsa> (Minor issue)
[bullseye] - arm-trusted-firmware <no-dsa> (Minor issue)
https://github.com/renesas-rcar/arm-trusted-firmware/commit/c9fb3558410032d2660c7f3b7d4b87dec09fe2f2
https://asrg.io/security-advisories/cve-2024-6564/