On Sat Dec 21, 2024 at 12:03 AM CET, Vagrant Cascadian wrote:
> On 2024-12-20, Diederik de Haas wrote:
> > On Tue Jul 09, 2024 at 22:10 CEST, Salvatore Bonaccorso wrote:
> >> The following vulnerabilities were published for arm-trusted-firmware.
> >>
> >> CVE-2024-6564[1]:
> >> | Buffer overflow in "rcar_dev_init"  due to using due to using
> >> | untrusted data (rcar_image_number) as a loop counter before
> >> | verifying it against RCAR_MAX_BL3X_IMAGE. This could lead to a full
> >> | bypass of secure boot.
> >
> > Fixed in tag v2.11-rc0 in commit:
> > b469880e3b6b ("fix(rcar3-drivers): check "rcar_image_number" variable 
> > before use")
> ...
> > I've only/quickly checked the latter CVE and the offending code has been
> > present since tag v2.1-rc0 via commit:
> > c2f286820471 ("rcar_gen3: drivers: io [emmc/mem]")
> >
> > I just checked the upstream lts-2.8 branch and the issue is still
> > present in tag lts-v2.8.26 (AFAICT the Debian package is at 2.8.0).
> > There's quite a high chance it's also present in oldstable.
>
> Present in the source code, perhaps, but not in shipped binaries in the
> .deb! The rcar/renesas platform was not added to debian's
> arm-trusted-firmware packages until version 2.9.0+dfsg-1.

Excellent, so we just need to update the package in Unstable then.

FTR: the problem is also present upstream in lts-v2.10.10.
I'm not going to do anything with it, but if someone feels inclined,
they could inform upstream about it.

> Thanks for noting the upstream commits fixing the issue!

You're welcome. I find tracebility important and useful :-)
Did that with my kernel work too, but it doesn't seem to have inspired
others ;-P

Cheers,
  Diederik

Attachment: signature.asc
Description: PGP signature

Reply via email to