Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2020-8432

Опубликовано: 29 янв. 2020
Источник: nvd
CVSS3: 9.8
CVSS2: 10
EPSS Низкий

Описание

In Das U-Boot through 2020.01, a double free has been found in the cmd/gpt.c do_rename_gpt_parts() function. Double freeing may result in a write-what-where condition, allowing an attacker to execute arbitrary code. NOTE: this vulnerablity was introduced when attempting to fix a memory leak identified by static analysis.

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:denx:u-boot:*:*:*:*:*:*:*:*
Версия до 2020.01 (включая)
Конфигурация 2
cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*

EPSS

Процентиль: 83%
0.01959
Низкий

9.8 Critical

CVSS3

10 Critical

CVSS2

Дефекты

CWE-415

Связанные уязвимости

CVSS3: 9.8
ubuntu
около 6 лет назад

In Das U-Boot through 2020.01, a double free has been found in the cmd/gpt.c do_rename_gpt_parts() function. Double freeing may result in a write-what-where condition, allowing an attacker to execute arbitrary code. NOTE: this vulnerablity was introduced when attempting to fix a memory leak identified by static analysis.

CVSS3: 9.8
debian
около 6 лет назад

In Das U-Boot through 2020.01, a double free has been found in the cmd ...

github
больше 3 лет назад

In Das U-Boot through 2020.01, a double free has been found in the cmd/gpt.c do_rename_gpt_parts() function. Double freeing may result in a write-what-where condition, allowing an attacker to execute arbitrary code. NOTE: this vulnerablity was introduced when attempting to fix a memory leak identified by static analysis.

CVSS3: 9.8
fstec
около 6 лет назад

Уязвимость функции do_rename_gpt_parts() (cmd/gpt.c) загрузчика U-Boot встроенных операционных систем на базе Linux, позволяющая нарушителю выполнить произвольный код

suse-cvrf
больше 5 лет назад

Security update for u-boot

EPSS

Процентиль: 83%
0.01959
Низкий

9.8 Critical

CVSS3

10 Critical

CVSS2

Дефекты

CWE-415