cve/2024/CVE-2024-1633.md
2024-05-25 21:48:12 +02:00

18 lines
1.1 KiB
Markdown
Raw Blame History

This file contains invisible Unicode characters

This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

### [CVE-2024-1633](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-1633)
![](https://img.shields.io/static/v1?label=Product&message=rcar_gen3_v2.5&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20v2.5%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-190%20Integer%20Overflow%20or%20Wraparound&color=brighgreen)
### Description
During the secure boot, bl2 (the second stage ofthe bootloader) loops over images defined in the table “bl2_mem_params_descs”.For each image, the bl2 reads the image length and destination from the imagescertificate. Because of the way of reading from the image, which base on 32-bit unsigned integer value, it can result to an integer overflow. An attacker can bypass memory range restriction and write data out of buffer bounds, which could result in bypass of secure boot. Affected git version from c2f286820471ed276c57e603762bd831873e5a17 until (not 
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/fkie-cad/nvd-json-data-feeds