An exploitable vulnerability exists in the verified boot protection of the Das U-Boot from version 2013.07-rc1 to 2014.07-rc2. The affected versions lack proper FIT signature enforcement, which allows an attacker to bypass U-Boots verified boot and execute an unsigned kernel, embedded in a legacy image format. To trigger this vulnerability, a local attacker needs to be able to supply the image to boot.
The product does not verify, or incorrectly verifies, the cryptographic signature for data.
Name | Vendor | Start Version | End Version |
---|---|---|---|
U-boot | Denx | 2013.07 (including) | 2014.07 (including) |
U-boot | Denx | 2013.07-rc1 (including) | 2013.07-rc1 (including) |
U-boot | Denx | 2013.07-rc2 (including) | 2013.07-rc2 (including) |
U-boot | Denx | 2013.07-rc3 (including) | 2013.07-rc3 (including) |
U-boot | Denx | 2014.07-rc1 (including) | 2014.07-rc1 (including) |
U-boot | Denx | 2014.07-rc2 (including) | 2014.07-rc2 (including) |
U-boot | Ubuntu | trusty | * |
U-boot | Ubuntu | upstream | * |