2

CVE-2024-1633

During the secure boot, bl2 (the second stage of
the bootloader) loops over images defined in the table “bl2_mem_params_descs”.
For each image, the bl2 reads the image length and destination from the image’s
certificate. Because of the way of reading from the image, which base on 32-bit unsigned integer value, it can result to an integer overflow. An attacker can bypass memory range restriction and write data out of buffer bounds, which could result in bypass of secure boot.

 Affected git version from c2f286820471ed276c57e603762bd831873e5a17 until (not 
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
RenesasArm-trusted-firmware Versionrcar_gen3_2.5
   RenesasR-car D3e Version-
   RenesasR-car E3e Version-
   RenesasR-car H3e Version-
   RenesasR-car H3ne Version-
   RenesasR-car M3e Version-
   RenesasR-car M3ne Version-
   RenesasR-car V3h Version-
   RenesasR-car V3h2 Version-
   RenesasR-car V3m Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.01% 0.003
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 2 0.5 1.4
CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
cve@asrg.io 2 0.5 1.4
CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
CWE-190 Integer Overflow or Wraparound

The product performs a calculation that can produce an integer overflow or wraparound when the logic assumes that the resulting value will always be larger than the original value. This occurs when an integer value is incremented to a value that is too large to store in the associated representation. When this occurs, the value may become a very small or negative number.