We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
During the secure boot, bl2 (the second stage of the bootloader) loops over images defined in the table “bl2_mem_params_descs”. For each image, the bl2 reads the image length and destination from the image’s certificate. Because of the way of reading from the image, which base on 32-bit unsigned integer value, it can result to an integer overflow. An attacker can bypass memory range restriction and write data out of buffer bounds, which could result in bypass of secure boot. Affected git version from c2f286820471ed276c57e603762bd831873e5a17 until (not
Reserved 2024-02-19 | Published 2024-02-19 | Updated 2024-08-01 | Assigner ASRGCWE-190 Integer Overflow or Wraparound
Tomer.Fichman@cymotive.com
asrg.io/security-advisories/CVE-2024-1633/
Support options