CVE-2014-0973

The image_verify function in platform/msm_shared/image_verify.c in the Little Kernel (LK) bootloader, as distributed with Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, does not check whether a certain digest size is consistent with the RSA_public_decrypt API specification, which makes it easier for attackers to bypass boot-image authentication requirements via trailing data.
Configurations

Configuration 1 (hide)

cpe:2.3:a:little_kernel_project:little_kernel_bootloader:-:-:-:-:-:android:*:*

History

21 Nov 2024, 02:03

Type Values Removed Values Added
References () http://source.android.com/security/bulletin/2016-07-01.html - () http://source.android.com/security/bulletin/2016-07-01.html -
References () https://www.codeaurora.org/projects/security-advisories/incomplete-signature-parsing-during-boot-image-authentication-leads-to-signature-forgery-cve-2014-0973 - Patch () https://www.codeaurora.org/projects/security-advisories/incomplete-signature-parsing-during-boot-image-authentication-leads-to-signature-forgery-cve-2014-0973 - Patch

Information

Published : 2014-08-25 01:55

Updated : 2024-11-21 02:03


NVD link : CVE-2014-0973

Mitre link : CVE-2014-0973

CVE.ORG link : CVE-2014-0973


JSON object : View

Products Affected

little_kernel_project

  • little_kernel_bootloader
CWE
CWE-287

Improper Authentication