During the secure boot, bl2 (the second stage of the bootloader) loops over images defined in the table “bl2_mem_params_descs”. For each image, the bl2 reads the image length and destination from the image’s certificate. Because of the way of reading from the image, which base on 32-bit unsigned integer value, it can result to an integer overflow. An attacker can bypass memory range restriction and write data out of buffer bounds, which could result in bypass of secure boot. Affected git version from c2f286820471ed276c57e603762bd831873e5a17 until (not 
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: ASRG

Published: 2024-02-19T16:42:29.949Z

Updated: 2024-08-01T18:48:20.650Z

Reserved: 2024-02-19T16:36:31.290Z

Link: CVE-2024-1633

cve-icon Vulnrichment

Updated: 2024-08-01T18:48:20.650Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-02-19T17:15:08.347

Modified: 2024-02-20T19:50:53.960

Link: CVE-2024-1633

cve-icon Redhat

No data.