Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-j5r3-pwr2-9cqj

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

In Das U-Boot through 2020.01, a double free has been found in the cmd/gpt.c do_rename_gpt_parts() function. Double freeing may result in a write-what-where condition, allowing an attacker to execute arbitrary code. NOTE: this vulnerablity was introduced when attempting to fix a memory leak identified by static analysis.

In Das U-Boot through 2020.01, a double free has been found in the cmd/gpt.c do_rename_gpt_parts() function. Double freeing may result in a write-what-where condition, allowing an attacker to execute arbitrary code. NOTE: this vulnerablity was introduced when attempting to fix a memory leak identified by static analysis.

EPSS

Процентиль: 83%
0.01959
Низкий

Дефекты

CWE-415

Связанные уязвимости

CVSS3: 9.8
ubuntu
около 6 лет назад

In Das U-Boot through 2020.01, a double free has been found in the cmd/gpt.c do_rename_gpt_parts() function. Double freeing may result in a write-what-where condition, allowing an attacker to execute arbitrary code. NOTE: this vulnerablity was introduced when attempting to fix a memory leak identified by static analysis.

CVSS3: 9.8
nvd
около 6 лет назад

In Das U-Boot through 2020.01, a double free has been found in the cmd/gpt.c do_rename_gpt_parts() function. Double freeing may result in a write-what-where condition, allowing an attacker to execute arbitrary code. NOTE: this vulnerablity was introduced when attempting to fix a memory leak identified by static analysis.

CVSS3: 9.8
debian
около 6 лет назад

In Das U-Boot through 2020.01, a double free has been found in the cmd ...

CVSS3: 9.8
fstec
около 6 лет назад

Уязвимость функции do_rename_gpt_parts() (cmd/gpt.c) загрузчика U-Boot встроенных операционных систем на базе Linux, позволяющая нарушителю выполнить произвольный код

suse-cvrf
больше 5 лет назад

Security update for u-boot

EPSS

Процентиль: 83%
0.01959
Низкий

Дефекты

CWE-415