In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsUpgrade u-boot
to version 2025.01-rc1 or higher.
Affected versions of this package are vulnerable to Integer Overflow or Wraparound via the ext4fs_read_symlink()
function. An attacker can carefully craft a ext4
filesystem that can exhibit an inode size of 0xffffffff
, as a consequence zalloc()
will do a zero allocation. Later in the function the inode size is again used for copying data, allowing an attacker to overwrite memory.