In Das U-Boot through 2020.01, a double free has been found in the cmd/gpt.c do_rename_gpt_parts() function. Double freeing may result in a write-what-where condition, allowing an attacker to execute arbitrary code. NOTE: this vulnerablity was introduced when attempting to fix a memory leak identified by static analysis.
References
Configurations
History
21 Nov 2024, 05:38
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00030.html - Mailing List, Third Party Advisory | |
References | () https://www.mail-archive.com/u-boot%40lists.denx.de/msg354060.html - | |
References | () https://www.mail-archive.com/u-boot%40lists.denx.de/msg354114.html - |
07 Nov 2023, 03:26
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2020-01-29 19:15
Updated : 2024-11-21 05:38
NVD link : CVE-2020-8432
Mitre link : CVE-2020-8432
CVE.ORG link : CVE-2020-8432
JSON object : View
Products Affected
denx
- u-boot
opensuse
- leap