CVE-2024-1633
During the secure boot, bl2 (the second stage ofthe bootloader) loops over images defined in the table “bl2_mem_params_descs”.For each image, the bl2 reads the image length and destination from the image’scertificate. Because of the way of reading from the image, which base on 32-bit unsigned integ...