CVE-2023-49100

Source
https://nvd.nist.gov/vuln/detail/CVE-2023-49100
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-49100.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-49100
Related
Published
2024-02-21T16:15:49Z
Modified
2025-02-19T03:35:50.252052Z
Summary
[none]
Details

Trusted Firmware-A (TF-A) before 2.10 has a potential read out-of-bounds in the SDEI service. The input parameter passed in register x1 is not validated well enough in the function sdeiinterruptbind. The parameter is passed to a call to platicgetinterrupttype. It can be any arbitrary value passing checks in the function platicis_sgi. A compromised Normal World (Linux kernel) can enable a root-privileged attacker to issue arbitrary SMC calls. Using this primitive, he can control the content of registers x0 through x6, which are used to send parameters to TF-A. Out-of-bounds addresses can be read in the context of TF-A (EL3). Because the read value is never returned to non-secure memory or in registers, no leak is possible. An attacker can still crash TF-A, however.

References

Affected packages

Debian:11 / arm-trusted-firmware

Package

Name
arm-trusted-firmware
Purl
pkg:deb/debian/arm-trusted-firmware?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*

2.4+dfsg-2
2.5+dfsg-1
2.5+dfsg-2
2.6~rc0+dfsg-1
2.6+dfsg-1
2.7.0+dfsg-1
2.7.0+dfsg-2
2.8.0+dfsg-1
2.9.0+dfsg-1
2.9.0+dfsg-2
2.9.0+dfsg-3
2.10.0+dfsg-1
2.10.10+dfsg-1
2.12.0+dfsg-1
2.12.0+dfsg-2

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / arm-trusted-firmware

Package

Name
arm-trusted-firmware
Purl
pkg:deb/debian/arm-trusted-firmware?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*

2.8.0+dfsg-1
2.9.0+dfsg-1
2.9.0+dfsg-2
2.9.0+dfsg-3
2.10.0+dfsg-1
2.10.10+dfsg-1
2.12.0+dfsg-1
2.12.0+dfsg-2

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / arm-trusted-firmware

Package

Name
arm-trusted-firmware
Purl
pkg:deb/debian/arm-trusted-firmware?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.10.0+dfsg-1

Affected versions

2.*

2.8.0+dfsg-1
2.9.0+dfsg-1
2.9.0+dfsg-2
2.9.0+dfsg-3

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Git / github.com/arm-software/arm-trusted-firmware

Affected ranges

Type
GIT
Repo
https://github.com/arm-software/arm-trusted-firmware
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

for-v0.*

for-v0.4-rc0

v0.*

v0.2
v0.3
v0.4
v0.4-rc1
v0.4-rc2

v1.*

v1.0
v1.0-rc0
v1.1
v1.1-rc0
v1.1-rc1
v1.1-rc2
v1.1-rc3
v1.2
v1.2-rc0
v1.3
v1.3-rc0
v1.3_rc1
v1.3_rc2
v1.4
v1.4-rc0
v1.5
v1.5-rc0
v1.5-rc1
v1.5-rc2
v1.5-rc3
v1.6
v1.6-rc0
v1.6-rc1

v2.*

v2.0
v2.0-rc0
v2.1
v2.1-rc0
v2.1-rc1
v2.10-rc0
v2.10-rc1
v2.2
v2.2-rc0
v2.2-rc1
v2.2-rc2
v2.3
v2.3-rc0
v2.3-rc1
v2.3-rc2
v2.4
v2.4-rc0
v2.4-rc1
v2.4-rc2
v2.5
v2.5-rc0
v2.5-rc1
v2.6
v2.6-rc0
v2.6-rc1
v2.7
v2.7-rc0
v2.7-rc1
v2.7.0
v2.8
v2.8-rc0
v2.8.0
v2.9
v2.9-rc0
v2.9-rc1
v2.9.0