In Das U-Boot through 2022.07-rc5, an integer signedness error and resultant stack-based buffer overflow in the "i2c md" command enables the corruption of the return address pointer of the do_i2c_md function.
The product writes data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://lists.denx.de/pipermail/u-boot/2022-June/486113.html | exploit patch vendor advisory |
https://github.com/u-boot/u-boot/commit/8f8c04bf1ebbd2f72f1643e7ad9617dafa6e5409 | exploit third party advisory patch |
https://source.denx.de/u-boot/u-boot/-/commit/8f8c04bf1ebbd2f72f1643e7ad9617dafa6e5409 | patch vendor advisory |