Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2020-8432

Опубликовано: 29 янв. 2020
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 10
CVSS3: 9.8

Описание

In Das U-Boot through 2020.01, a double free has been found in the cmd/gpt.c do_rename_gpt_parts() function. Double freeing may result in a write-what-where condition, allowing an attacker to execute arbitrary code. NOTE: this vulnerablity was introduced when attempting to fix a memory leak identified by static analysis.

РелизСтатусПримечание
bionic

released

2020.10+dfsg-1ubuntu0~18.04.2
devel

not-affected

2020.04+dfsg-2ubuntu1
eoan

ignored

end of life
esm-infra-legacy/trusty

DNE

esm-infra/bionic

released

2020.10+dfsg-1ubuntu0~18.04.2
esm-infra/focal

released

2021.01+dfsg-3ubuntu0~20.04.3
esm-infra/xenial

not-affected

code not present
focal

released

2021.01+dfsg-3ubuntu0~20.04.3
groovy

not-affected

2020.04+dfsg-2ubuntu1
hirsute

not-affected

2020.04+dfsg-2ubuntu1

Показывать по

EPSS

Процентиль: 83%
0.01959
Низкий

10 Critical

CVSS2

9.8 Critical

CVSS3

Связанные уязвимости

CVSS3: 9.8
nvd
около 6 лет назад

In Das U-Boot through 2020.01, a double free has been found in the cmd/gpt.c do_rename_gpt_parts() function. Double freeing may result in a write-what-where condition, allowing an attacker to execute arbitrary code. NOTE: this vulnerablity was introduced when attempting to fix a memory leak identified by static analysis.

CVSS3: 9.8
debian
около 6 лет назад

In Das U-Boot through 2020.01, a double free has been found in the cmd ...

github
больше 3 лет назад

In Das U-Boot through 2020.01, a double free has been found in the cmd/gpt.c do_rename_gpt_parts() function. Double freeing may result in a write-what-where condition, allowing an attacker to execute arbitrary code. NOTE: this vulnerablity was introduced when attempting to fix a memory leak identified by static analysis.

CVSS3: 9.8
fstec
около 6 лет назад

Уязвимость функции do_rename_gpt_parts() (cmd/gpt.c) загрузчика U-Boot встроенных операционных систем на базе Linux, позволяющая нарушителю выполнить произвольный код

suse-cvrf
больше 5 лет назад

Security update for u-boot

EPSS

Процентиль: 83%
0.01959
Низкий

10 Critical

CVSS2

9.8 Critical

CVSS3