Lines Matching refs:in
5 | Title | Malformed Firmware Update SMC can result in copy or |
6 | | authentication of unexpected data in secure memory in |
19 | Impact | Copy or authentication of unexpected data in the secure |
31 result in a value large enough to wrap around, which may lead to unpredictable
51 The buggy code has been present in ARM Trusted Firmware (TF) since `Pull Request
55 then, the ``check_uptr_overflow()`` macro was not used in AArch32 code.
57 The vulnerability resides in the BL1 FWU SMC handling code and it may be
62 - Platform code uses the Firmware Update (FWU) code provided in
68 overflows in the input validation checks while handling the
84 attacker. A very large 32-bit value, for example ``2^32 -1``, may result in the
90 secure memory if the memory is mapped in BL1's address space, or cause a fatal
94 resident in secure memory. This is implemented by the ``bl1_fwu_image_auth()``
110 Note that in both cases, a separate vulnerability is required to leverage this
113 would need to be compromised in order to send a malformed FWU SMC that triggers