Exploit maturity not defined.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsThere is no fixed version for Debian:13
u-boot
.
Note: Versions mentioned in the description apply only to the upstream u-boot
package and not the u-boot
package as distributed by Debian
.
See How to fix?
for Debian:13
relevant fixed versions and status.
An integer overflow in ext4fs_read_symlink in Das U-Boot before 2025.01-rc1 occurs for zalloc (adding one to an le32 variable) via a crafted ext4 filesystem with an inode size of 0xffffffff, resulting in a malloc of zero and resultant memory overwrite.