Source: arm-trusted-firmware
X-Debbugs-CC: t...@security.debian.org
Severity: important
Tags: security

Hi,

The following vulnerabilities were published for arm-trusted-firmware.

CVE-2024-6287[0]:
| Incorrect Calculation vulnerability in Renesas arm-trusted-firmware
| allows Local Execution of Code.   When checking whether a new image
| invades/overlaps with a previously loaded image the code neglects to
| consider a few cases. that could An attacker to bypass memory range
| restriction and overwrite an already loaded image partly or
| completely, which could result in code execution and bypass of
| secure boot.

https://github.com/renesas-rcar/arm-trusted-firmware/commit/954d488a9798f8fda675c6b57c571b469b298f04
https://asrg.io/security-advisories/cve-2024-6287-incorrect-address-range-calculations-in-renesas-rcar/


CVE-2024-6285[1]:
| Integer Underflow (Wrap or Wraparound) vulnerability in Renesas arm-
| trusted-firmware. An integer underflow in image range check
| calculations could lead to bypassing address restrictions and
| loading of images to unallowed addresses.

https://github.com/renesas-rcar/arm-trusted-firmware/commit/b596f580637bae919b0ac3a5471422a1f756db3b
https://asrg.io/security-advisories/cve-2024-6285-integer-underflow-in-memory-range-check-in-renesas-rcar/


If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2024-6287
    https://www.cve.org/CVERecord?id=CVE-2024-6287
[1] https://security-tracker.debian.org/tracker/CVE-2024-6285
    https://www.cve.org/CVERecord?id=CVE-2024-6285

Please adjust the affected versions in the BTS as needed.

Reply via email to