UBUNTU-CVE-2023-49100

Source
https://ubuntu.com/security/CVE-2023-49100
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2023/UBUNTU-CVE-2023-49100.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2023-49100
Related
Published
2024-02-21T16:15:00Z
Modified
2024-10-15T14:11:50Z
Summary
[none]
Details

Trusted Firmware-A (TF-A) before 2.10 has a potential read out-of-bounds in the SDEI service. The input parameter passed in register x1 is not validated well enough in the function sdeiinterruptbind. The parameter is passed to a call to platicgetinterrupttype. It can be any arbitrary value passing checks in the function platicis_sgi. A compromised Normal World (Linux kernel) can enable a root-privileged attacker to issue arbitrary SMC calls. Using this primitive, he can control the content of registers x0 through x6, which are used to send parameters to TF-A. Out-of-bounds addresses can be read in the context of TF-A (EL3). Because the read value is never returned to non-secure memory or in registers, no leak is possible. An attacker can still crash TF-A, however.

References

Affected packages

Ubuntu:20.04:LTS / arm-trusted-firmware

Package

Name
arm-trusted-firmware
Purl
pkg:deb/ubuntu/arm-trusted-firmware?arch=src?distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*

2.1-3
2.2-2

Ecosystem specific

{
    "ubuntu_priority": "medium"
}

Ubuntu:22.04:LTS / arm-trusted-firmware

Package

Name
arm-trusted-firmware
Purl
pkg:deb/ubuntu/arm-trusted-firmware?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*

2.5+dfsg-1
2.6+dfsg-1

Ecosystem specific

{
    "ubuntu_priority": "medium"
}

Ubuntu:24.04:LTS / arm-trusted-firmware

Package

Name
arm-trusted-firmware
Purl
pkg:deb/ubuntu/arm-trusted-firmware?arch=src?distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.10.0+dfsg-1

Affected versions

2.*

2.9.0+dfsg-3

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "medium",
    "binaries": [
        {
            "binary_version": "2.10.0+dfsg-1",
            "binary_name": "arm-trusted-firmware"
        },
        {
            "binary_version": "2.10.0+dfsg-1",
            "binary_name": "arm-trusted-firmware-dbgsym"
        },
        {
            "binary_version": "2.10.0+dfsg-1",
            "binary_name": "arm-trusted-firmware-tools"
        },
        {
            "binary_version": "2.10.0+dfsg-1",
            "binary_name": "arm-trusted-firmware-tools-dbgsym"
        }
    ]
}