{
	"document":{
		"aggregate_severity":{
			"namespace":"https://nvd.nist.gov/vuln-metrics/cvss",
			"text":"MEDIUM"
		},
		"category":"csaf_vex",
		"csaf_version":"2.0",
		"distribution":{
			"tlp":{
				"label":"WHITE",
				"url":"https:/www.first.org/tlp/"
			}
		},
		"lang":"en",
		"notes":[
			{
				"text":"Buffer Copy without Checking Size of Input ( Classic Buffer Overflow ) vulnerability in Renesas arm-trusted-firmware allows Local Execution of Code. This vulnerability is associated with program files  https://github.Com/renesas-rcar/arm-trusted-firmware/blob/rcar_gen3_v2.5/drivers/renesas/common/io/i... https://github.Com/renesas-rcar/arm-trusted-firmware/blob/rcar_gen3_v2.5/drivers/renesas/common/io/io_rcar.C .In line 313  addr_loaded_cnt  is checked not to be  CHECK_IMAGE_AREA_CNT  (5) or larger, this check does not halt the function. Immediately after (line 317) there will be an overflow in the buffer and the value of  dst  will be written to the area immediately after the buffer, which is  addr_loaded_cnt . This will allow an attacker to freely control the value of  addr_loaded_cnt  and thus control the destination of the write immediately after (line 318). The write in line 318 will then be fully controlled by said attacker, with whichever address and whichever value ( len ) they desire.",
				"category":"general",
				"title":"Synopsis"
			}
		],
		"publisher":{
			"issuing_authority":"openEuler security committee",
			"name":"openEuler",
			"namespace":"https://www.openeuler.org",
			"contact_details":"openeuler-security@openeuler.org",
			"category":"vendor"
		},
		"references":[
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2024-6563"
			},
			{
				"summary":"CVE-2024-6563 vex file",
				"category":"self",
				"url":"https://repo.openeuler.org/security/data/csaf/cve/2024/csaf-openeuler-cve-2024-6563.json"
			},
			{
				"summary":"openEuler-SA-2024-1848",
				"category":"self",
				"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1848"
			},
			{
				"summary":"CVE-2024-6563",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2024-6563&packageName=arm-trusted-firmware"
			},
			{
				"summary":"openEuler-SA-2024-1849",
				"category":"self",
				"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1849"
			},
			{
				"summary":"openEuler-SA-2024-1850",
				"category":"self",
				"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1850"
			},
			{
				"summary":"openEuler-SA-2024-1851",
				"category":"self",
				"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1851"
			}
		],
		"title":"openEuler cve CVE-2024-6563",
		"tracking":{
			"initial_release_date":"2024-07-19T21:23:45+08:00",
			"revision_history":[
				{
					"date":"2024-07-19T21:23:45+08:00",
					"summary":"Initial",
					"number":"1.0.0"
				},
				{
					"date":"2024-07-19T21:23:46+08:00",
					"summary":"Current version",
					"number":"2.0.0"
				},
				{
					"date":"2024-07-19T21:23:48+08:00",
					"summary":"Current version",
					"number":"3.0.0"
				},
				{
					"date":"2024-07-19T21:23:49+08:00",
					"summary":"Current version",
					"number":"4.0.0"
				},
				{
					"date":"2024-08-19T17:35:36+08:00",
					"summary":"Current version",
					"number":"5.0.0"
				},
				{
					"date":"2024-08-19T17:35:37+08:00",
					"summary":"Current version",
					"number":"6.0.0"
				}
			],
			"generator":{
				"date":"2024-08-19T17:35:37+08:00",
				"engine":{
					"name":"openEuler CSAF Tool V1.0"
				}
			},
			"current_release_date":"2024-08-19T17:35:37+08:00",
			"id":"CVE-2024-6563",
			"version":"6.0.0",
			"status":"interim"
		}
	},
	"product_tree":{
		"branches":[
			{
				"name":"openEuler",
				"category":"vendor",
				"branches":[
					{
						"name":"openEuler",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"openEuler-22.03-LTS-SP1",
									"name":"openEuler-22.03-LTS-SP1"
								},
								"name":"openEuler-22.03-LTS-SP1",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"openEuler-24.03-LTS",
									"name":"openEuler-24.03-LTS"
								},
								"name":"openEuler-24.03-LTS",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP3"
									},
									"product_id":"openEuler-22.03-LTS-SP3",
									"name":"openEuler-22.03-LTS-SP3"
								},
								"name":"openEuler-22.03-LTS-SP3",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP4"
									},
									"product_id":"openEuler-22.03-LTS-SP4",
									"name":"openEuler-22.03-LTS-SP4"
								},
								"name":"openEuler-22.03-LTS-SP4",
								"category":"product_version"
							}
						],
						"category":"product_name"
					},
					{
						"name":"src",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP3"
									},
									"product_id":"arm-trusted-firmware-2.3-5.oe2203sp3.src.rpm",
									"name":"arm-trusted-firmware-2.3-5.oe2203sp3.src.rpm"
								},
								"name":"arm-trusted-firmware-2.3-5.oe2203sp3.src.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"arm-trusted-firmware-2.3-5.oe2203sp1.src.rpm",
									"name":"arm-trusted-firmware-2.3-5.oe2203sp1.src.rpm"
								},
								"name":"arm-trusted-firmware-2.3-5.oe2203sp1.src.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP4"
									},
									"product_id":"arm-trusted-firmware-2.3-5.oe2203sp4.src.rpm",
									"name":"arm-trusted-firmware-2.3-5.oe2203sp4.src.rpm"
								},
								"name":"arm-trusted-firmware-2.3-5.oe2203sp4.src.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"arm-trusted-firmware-2.9-3.oe2403.src.rpm",
									"name":"arm-trusted-firmware-2.9-3.oe2403.src.rpm"
								},
								"name":"arm-trusted-firmware-2.9-3.oe2403.src.rpm",
								"category":"product_version"
							}
						],
						"category":"product_name"
					},
					{
						"name":"aarch64",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP1"
									},
									"product_id":"arm-trusted-firmware-armv8-2.3-5.oe2203sp1.aarch64.rpm",
									"name":"arm-trusted-firmware-armv8-2.3-5.oe2203sp1.aarch64.rpm"
								},
								"name":"arm-trusted-firmware-armv8-2.3-5.oe2203sp1.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP3"
									},
									"product_id":"arm-trusted-firmware-armv8-2.3-5.oe2203sp3.aarch64.rpm",
									"name":"arm-trusted-firmware-armv8-2.3-5.oe2203sp3.aarch64.rpm"
								},
								"name":"arm-trusted-firmware-armv8-2.3-5.oe2203sp3.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS"
									},
									"product_id":"arm-trusted-firmware-armv8-2.9-3.oe2403.aarch64.rpm",
									"name":"arm-trusted-firmware-armv8-2.9-3.oe2403.aarch64.rpm"
								},
								"name":"arm-trusted-firmware-armv8-2.9-3.oe2403.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP4"
									},
									"product_id":"arm-trusted-firmware-armv8-2.3-5.oe2203sp4.aarch64.rpm",
									"name":"arm-trusted-firmware-armv8-2.3-5.oe2203sp4.aarch64.rpm"
								},
								"name":"arm-trusted-firmware-armv8-2.3-5.oe2203sp4.aarch64.rpm",
								"category":"product_version"
							}
						],
						"category":"product_name"
					}
				]
			}
		],
		"relationships":[
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP4",
				"product_reference":"arm-trusted-firmware-2.3-5.oe2203sp4.src.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP4:arm-trusted-firmware-2.3-5.oe2203sp4.src",
					"name":"arm-trusted-firmware-2.3-5.oe2203sp4.src as a component of openEuler-22.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP4",
				"product_reference":"arm-trusted-firmware-armv8-2.3-5.oe2203sp4.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP4:arm-trusted-firmware-armv8-2.3-5.oe2203sp4.aarch64",
					"name":"arm-trusted-firmware-armv8-2.3-5.oe2203sp4.aarch64 as a component of openEuler-22.03-LTS-SP4"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP1",
				"product_reference":"arm-trusted-firmware-2.3-5.oe2203sp1.src.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP1:arm-trusted-firmware-2.3-5.oe2203sp1.src",
					"name":"arm-trusted-firmware-2.3-5.oe2203sp1.src as a component of openEuler-22.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP1",
				"product_reference":"arm-trusted-firmware-armv8-2.3-5.oe2203sp1.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP1:arm-trusted-firmware-armv8-2.3-5.oe2203sp1.aarch64",
					"name":"arm-trusted-firmware-armv8-2.3-5.oe2203sp1.aarch64 as a component of openEuler-22.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP3",
				"product_reference":"arm-trusted-firmware-2.3-5.oe2203sp3.src.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP3:arm-trusted-firmware-2.3-5.oe2203sp3.src",
					"name":"arm-trusted-firmware-2.3-5.oe2203sp3.src as a component of openEuler-22.03-LTS-SP3"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP3",
				"product_reference":"arm-trusted-firmware-armv8-2.3-5.oe2203sp3.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP3:arm-trusted-firmware-armv8-2.3-5.oe2203sp3.aarch64",
					"name":"arm-trusted-firmware-armv8-2.3-5.oe2203sp3.aarch64 as a component of openEuler-22.03-LTS-SP3"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"arm-trusted-firmware-armv8-2.9-3.oe2403.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:arm-trusted-firmware-armv8-2.9-3.oe2403.aarch64",
					"name":"arm-trusted-firmware-armv8-2.9-3.oe2403.aarch64 as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS",
				"product_reference":"arm-trusted-firmware-2.9-3.oe2403.src.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS:arm-trusted-firmware-2.9-3.oe2403.src",
					"name":"arm-trusted-firmware-2.9-3.oe2403.src as a component of openEuler-24.03-LTS"
				},
				"category":"default_component_of"
			}
		]
	},
	"vulnerabilities":[
		{
			"cve":"CVE-2024-6563",
			"notes":[
				{
					"text":"Buffer Copy without Checking Size of Input ( Classic Buffer Overflow ) vulnerability in Renesas arm-trusted-firmware allows Local Execution of Code. This vulnerability is associated with program files  https://github.Com/renesas-rcar/arm-trusted-firmware/blob/rcar_gen3_v2.5/drivers/renesas/common/io/i... https://github.Com/renesas-rcar/arm-trusted-firmware/blob/rcar_gen3_v2.5/drivers/renesas/common/io/io_rcar.C .In line 313  addr_loaded_cnt  is checked not to be  CHECK_IMAGE_AREA_CNT  (5) or larger, this check does not halt the function. Immediately after (line 317) there will be an overflow in the buffer and the value of  dst  will be written to the area immediately after the buffer, which is  addr_loaded_cnt . This will allow an attacker to freely control the value of  addr_loaded_cnt  and thus control the destination of the write immediately after (line 318). The write in line 318 will then be fully controlled by said attacker, with whichever address and whichever value ( len ) they desire.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP4:arm-trusted-firmware-2.3-5.oe2203sp4.src",
					"openEuler-22.03-LTS-SP4:arm-trusted-firmware-armv8-2.3-5.oe2203sp4.aarch64",
					"openEuler-22.03-LTS-SP1:arm-trusted-firmware-2.3-5.oe2203sp1.src",
					"openEuler-22.03-LTS-SP1:arm-trusted-firmware-armv8-2.3-5.oe2203sp1.aarch64",
					"openEuler-22.03-LTS-SP3:arm-trusted-firmware-2.3-5.oe2203sp3.src",
					"openEuler-22.03-LTS-SP3:arm-trusted-firmware-armv8-2.3-5.oe2203sp3.aarch64",
					"openEuler-24.03-LTS:arm-trusted-firmware-armv8-2.9-3.oe2403.aarch64",
					"openEuler-24.03-LTS:arm-trusted-firmware-2.9-3.oe2403.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP4:arm-trusted-firmware-2.3-5.oe2203sp4.src",
						"openEuler-22.03-LTS-SP4:arm-trusted-firmware-armv8-2.3-5.oe2203sp4.aarch64"
					],
					"details":"arm-trusted-firmware security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1848"
				},
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP1:arm-trusted-firmware-2.3-5.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:arm-trusted-firmware-armv8-2.3-5.oe2203sp1.aarch64"
					],
					"details":"arm-trusted-firmware security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1849"
				},
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP3:arm-trusted-firmware-2.3-5.oe2203sp3.src",
						"openEuler-22.03-LTS-SP3:arm-trusted-firmware-armv8-2.3-5.oe2203sp3.aarch64"
					],
					"details":"arm-trusted-firmware security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1850"
				},
				{
					"product_ids":[
						"openEuler-24.03-LTS:arm-trusted-firmware-armv8-2.9-3.oe2403.aarch64",
						"openEuler-24.03-LTS:arm-trusted-firmware-2.9-3.oe2403.src"
					],
					"details":"arm-trusted-firmware security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1851"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":6.7,
						"vectorString":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP4:arm-trusted-firmware-2.3-5.oe2203sp4.src",
						"openEuler-22.03-LTS-SP4:arm-trusted-firmware-armv8-2.3-5.oe2203sp4.aarch64",
						"openEuler-22.03-LTS-SP1:arm-trusted-firmware-2.3-5.oe2203sp1.src",
						"openEuler-22.03-LTS-SP1:arm-trusted-firmware-armv8-2.3-5.oe2203sp1.aarch64",
						"openEuler-22.03-LTS-SP3:arm-trusted-firmware-2.3-5.oe2203sp3.src",
						"openEuler-22.03-LTS-SP3:arm-trusted-firmware-armv8-2.3-5.oe2203sp3.aarch64",
						"openEuler-24.03-LTS:arm-trusted-firmware-armv8-2.9-3.oe2403.aarch64",
						"openEuler-24.03-LTS:arm-trusted-firmware-2.9-3.oe2403.src"
					]
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2024-6563"
		}
	]
}