Trusted Firmware-A through 2.8 has an out-of-bounds read in the X.509 parser for parsing boot certificates. This affects downstream use of get_ext and auth_nvctr. Attackers might be able to trigger dangerous read side effects or obtain sensitive information about microarchitectural state.
References
Link | Resource |
---|---|
http://www.openwall.com/lists/oss-security/2023/01/16/8 | Mailing List Patch Third Party Advisory |
https://trustedfirmware-a.readthedocs.io/en/latest/security_advisories/security-advisory-tfv-10.html | Patch Vendor Advisory |
https://www.trustedfirmware.org/news/ | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2023-01-16T00:00:00
Updated: 2023-01-16T00:00:00
Reserved: 2022-12-20T00:00:00
Link: CVE-2022-47630
JSON object: View
NVD Information
Status : Analyzed
Published: 2023-01-16T16:15:10.940
Modified: 2023-01-24T14:15:00.710
Link: CVE-2022-47630
JSON object: View
Redhat Information
No data.
CWE