Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 717000 (CVE-2020-8432) - <dev-embedded/u-boot-tools-2020.04: double free vulnerability (CVE-2020-8432)
Summary: <dev-embedded/u-boot-tools-2020.04: double free vulnerability (CVE-2020-8432)
Status: IN_PROGRESS
Alias: CVE-2020-8432
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: Normal normal (vote)
Assignee: Gentoo Security
URL: https://www.mail-archive.com/u-boot@l...
Whiteboard: C2 [glsa? cve]
Keywords: PullRequest
Depends on:
Blocks:
 
Reported: 2020-04-10 22:45 UTC by GLSAMaker/CVETool Bot
Modified: 2021-03-09 16:05 UTC (History)
2 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description GLSAMaker/CVETool Bot gentoo-dev 2020-04-10 22:45:33 UTC
CVE-2020-8432 (https://nvd.nist.gov/vuln/detail/CVE-2020-8432):
  In Das U-Boot through 2020.01, a double free has been found in the cmd/gpt.c
  do_rename_gpt_parts() function. Double freeing may result in a
  write-what-where condition, allowing an attacker to execute arbitrary code.
  NOTE: this vulnerablity was introduced when attempting to fix a memory leak
  identified by static analysis.
Comment 1 John Helmert III gentoo-dev Security 2021-01-03 16:35:15 UTC
Alright, it looks like the commit that fixes this was made on 20200121: https://gitlab.denx.de/u-boot/u-boot/-/commit/5749faa3d6837d6dbaf2119fc3ec49a326690c8f

Can we stable newest u-boot-tools? CCing Slyfox since he's the author of this revision.
Comment 2 Sam James archtester gentoo-dev Security 2021-01-06 01:04:47 UTC
amd64 done
Comment 3 Sam James archtester gentoo-dev Security 2021-01-06 06:34:23 UTC
x86 done
Comment 4 Sam James archtester gentoo-dev Security 2021-01-06 06:37:07 UTC
arm done

all arches done
Comment 5 Sam James archtester gentoo-dev Security 2021-01-06 06:38:48 UTC
Please cleanup, thanks!