u-boot is vulnerable to denial of service. The vulnerability exists due to the integer signedness error, resulting stack stack-based buffer overflow in the i2c md
command, which enables the corruption of the return address pointer of the do_i2c_md
function.
CPE | Name | Operator | Version |
---|---|---|---|
u-boot:sid | eq | 2020.10+dfsg-1+b1 | |
u-boot:sid | eq | 2020.10+dfsg-1+b1 |