CVE-2023-49100

See a problem?
Source
https://nvd.nist.gov/vuln/detail/CVE-2023-49100
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-49100.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2023-49100
Related
Published
2024-02-21T16:15:49Z
Modified
2024-09-18T03:25:48.285501Z
Summary
[none]
Details

Trusted Firmware-A (TF-A) before 2.10 has a potential read out-of-bounds in the SDEI service. The input parameter passed in register x1 is not validated well enough in the function sdeiinterruptbind. The parameter is passed to a call to platicgetinterrupttype. It can be any arbitrary value passing checks in the function platicis_sgi. A compromised Normal World (Linux kernel) can enable a root-privileged attacker to issue arbitrary SMC calls. Using this primitive, he can control the content of registers x0 through x6, which are used to send parameters to TF-A. Out-of-bounds addresses can be read in the context of TF-A (EL3). Because the read value is never returned to non-secure memory or in registers, no leak is possible. An attacker can still crash TF-A, however.

References

Affected packages

Debian:11 / arm-trusted-firmware

Package

Name
arm-trusted-firmware
Purl
pkg:deb/debian/arm-trusted-firmware?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*

2.4+dfsg-2
2.5+dfsg-1
2.5+dfsg-2
2.6~rc0+dfsg-1
2.6+dfsg-1
2.7.0+dfsg-1
2.7.0+dfsg-2
2.8.0+dfsg-1
2.9.0+dfsg-1
2.9.0+dfsg-2
2.9.0+dfsg-3
2.10.0+dfsg-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:12 / arm-trusted-firmware

Package

Name
arm-trusted-firmware
Purl
pkg:deb/debian/arm-trusted-firmware?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*

2.8.0+dfsg-1
2.9.0+dfsg-1
2.9.0+dfsg-2
2.9.0+dfsg-3
2.10.0+dfsg-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Debian:13 / arm-trusted-firmware

Package

Name
arm-trusted-firmware
Purl
pkg:deb/debian/arm-trusted-firmware?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.10.0+dfsg-1

Affected versions

2.*

2.8.0+dfsg-1
2.9.0+dfsg-1
2.9.0+dfsg-2
2.9.0+dfsg-3

Ecosystem specific

{
    "urgency": "not yet assigned"
}