In Das U-Boot through 2020.01, a double free has been found in the cmd/gpt.c do_rename_gpt_parts() function. Double freeing may result in a write-what-where condition, allowing an attacker to execute arbitrary code. NOTE: this vulnerablity was introduced when attempting to fix a memory leak identified by static analysis.
References
Link | Resource |
---|---|
https://www.mail-archive.com/u-boot@lists.denx.de/msg354060.html | Mailing List Third Party Advisory |
https://www.mail-archive.com/u-boot@lists.denx.de/msg354114.html | Mailing List Third Party Advisory |
http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00030.html | Mailing List Third Party Advisory |
Information
Published : 2020-01-29 11:15
Updated : 2021-07-21 04:39
NVD link : CVE-2020-8432
Mitre link : CVE-2020-8432
JSON object : View
Products Affected
denx
- u-boot
opensuse
- leap