Lucene search

K
gentooGentoo FoundationGLSA-202405-23
HistoryMay 08, 2024 - 12:00 a.m.

U-Boot tools: double free vulnerability

2024-05-0800:00:00
Gentoo Foundation
security.gentoo.org
4
u-boot
vulnerability
double free
cmd/gpt.c
do_rename_gpt_parts()
upgrade

7.5 High

AI Score

Confidence

Low

0.008 Low

EPSS

Percentile

82.1%

Background

U-Boot tools provides utiiities for working with Das U-Boot.

Description

A vulnerability has been discovered in U-Boot tools. Please review the CVE identifier referenced below for details.

Impact

In Das U-Boot a double free has been found in the cmd/gpt.c do_rename_gpt_parts() function. Double freeing may result in a write-what-where condition, allowing an attacker to execute arbitrary code.

Workaround

There is no known workaround at this time.

Resolution

All U-Boot tools users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=dev-embedded/u-boot-tools-2020.04"
OSVersionArchitecturePackageVersionFilename
Gentooanyalldev-embedded/u-boot-tools< 2020.04UNKNOWN

7.5 High

AI Score

Confidence

Low

0.008 Low

EPSS

Percentile

82.1%