First published: Mon Jul 08 2024(Updated: )
Buffer overflow in "rcar_dev_init" due to using due to using untrusted data (rcar_image_number) as a loop counter before verifying it against RCAR_MAX_BL3X_IMAGE. This could lead to a full bypass of secure boot.
Credit: cve@asrg.io
Affected Software | Affected Version | How to fix |
---|---|---|
Arm Trusted Firmware |
https://github.com/renesas-rcar/arm-trusted-firmware/commit/c9fb3558410032d2660c7f3b7d4b87dec09fe2f2
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-6564 is considered a critical vulnerability due to its potential to bypass secure boot.
Fixing CVE-2024-6564 involves updating the Renesas arm-trusted firmware to the latest version that addresses the buffer overflow issue.
CVE-2024-6564 may allow unauthorized access to system resources, compromising the integrity of the secure boot process.
CVE-2024-6564 affects the Renesas arm-trusted firmware, particularly in versions that utilize the vulnerable rcar_dev_init function.
The buffer overflow in CVE-2024-6564 occurs when untrusted data is used as a loop counter without proper validation against the RCAR_MAX_BL3X_IMAGE limit.