An exploitable vulnerability exists in the verified boot protection of the Das U-Boot from version 2013.07-rc1 to 2014.07-rc2. The affected versions lack proper FIT signature enforcement, which allows an attacker to bypass U-Boot's verified boot and execute an unsigned kernel, embedded in a legacy image format. To trigger this vulnerability, a local attacker needs to be able to supply the image to boot.
{
"binaries": [
{
"binary_name": "u-boot",
"binary_version": "2019.07+dfsg-1ubuntu4~18.04.1"
},
{
"binary_name": "u-boot-amlogic",
"binary_version": "2019.07+dfsg-1ubuntu4~18.04.1"
},
{
"binary_name": "u-boot-exynos",
"binary_version": "2019.07+dfsg-1ubuntu4~18.04.1"
},
{
"binary_name": "u-boot-imx",
"binary_version": "2019.07+dfsg-1ubuntu4~18.04.1"
},
{
"binary_name": "u-boot-omap",
"binary_version": "2019.07+dfsg-1ubuntu4~18.04.1"
},
{
"binary_name": "u-boot-qcom",
"binary_version": "2019.07+dfsg-1ubuntu4~18.04.1"
},
{
"binary_name": "u-boot-rockchip",
"binary_version": "2019.07+dfsg-1ubuntu4~18.04.1"
},
{
"binary_name": "u-boot-rpi",
"binary_version": "2019.07+dfsg-1ubuntu4~18.04.1"
},
{
"binary_name": "u-boot-sunxi",
"binary_version": "2019.07+dfsg-1ubuntu4~18.04.1"
},
{
"binary_name": "u-boot-tegra",
"binary_version": "2019.07+dfsg-1ubuntu4~18.04.1"
},
{
"binary_name": "u-boot-tools",
"binary_version": "2019.07+dfsg-1ubuntu4~18.04.1"
}
],
"availability": "No subscription required"
}