DEBIAN-CVE-2018-1000205

Source
https://security-tracker.debian.org/tracker/CVE-2018-1000205
Import Source
https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2018-1000205.json
JSON Data
https://api.test.osv.dev/v1/vulns/DEBIAN-CVE-2018-1000205
Upstream
Published
2018-06-26T16:29:00.307Z
Modified
2025-11-17T04:19:25.802157Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N CVSS Calculator
Summary
[none]
Details

U-Boot contains a CWE-20: Improper Input Validation vulnerability in Verified boot signature validation that can result in Bypass verified boot. This attack appear to be exploitable via Specially crafted FIT image and special device memory functionality.

References

Affected packages

Debian:11 / u-boot

Package

Name
u-boot
Purl
pkg:deb/debian/u-boot?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2021.*

2021.01+dfsg-5
2021.01+dfsg-5+deb11u1
2021.01+dfsg-5+deb11u2
2021.04~rc3+dfsg-1
2021.04~rc4+dfsg-1
2021.07~rc4+dfsg-1
2021.07+dfsg-1
2021.07+dfsg-2
2021.10~rc5+dfsg-1
2021.10+dfsg-1

2022.*

2022.01~rc2+dfsg-1
2022.01~rc4+dfsg-1
2022.01+dfsg-1
2022.01+dfsg-2
2022.04~rc2+dfsg-1
2022.04~rc4+dfsg-1
2022.04+dfsg-1
2022.04+dfsg-2
2022.07~rc3+dfsg-1
2022.07~rc3+dfsg-2
2022.07~rc4+dfsg-1
2022.07+dfsg-1
2022.10~rc2+dfsg-1
2022.10~rc2+dfsg-2
2022.10+dfsg-1
2022.10+dfsg-2

2023.*

2023.01~rc2+dfsg-1
2023.01~rc3+dfsg-1
2023.01~rc4+dfsg-1
2023.01~rc4+dfsg-2
2023.01+dfsg-1
2023.01+dfsg-2
2023.04~rc2+dfsg-1
2023.04~rc5+dfsg-1
2023.04+dfsg-1
2023.07~rc4+dfsg-1
2023.07~rc5+dfsg-1
2023.07+dfsg-1

2024.*

2024.01~rc6+dfsg-1
2024.01~rc6+dfsg-2
2024.01+dfsg-1
2024.01+dfsg-2
2024.01+dfsg-3
2024.01+dfsg-4
2024.01+dfsg-5
2024.01+dfsg-6
2024.01+dfsg-7

2025.*

2025.01-1
2025.01-2
2025.01-3

Ecosystem specific

{
    "urgency": "unimportant"
}

Database specific

source

"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2018-1000205.json"

Debian:12 / u-boot

Package

Name
u-boot
Purl
pkg:deb/debian/u-boot?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2023.*

2023.01+dfsg-2
2023.01+dfsg-2+deb12u1
2023.04~rc2+dfsg-1
2023.04~rc5+dfsg-1
2023.04+dfsg-1
2023.07~rc4+dfsg-1
2023.07~rc5+dfsg-1
2023.07+dfsg-1

2024.*

2024.01~rc6+dfsg-1
2024.01~rc6+dfsg-2
2024.01+dfsg-1
2024.01+dfsg-2
2024.01+dfsg-3
2024.01+dfsg-4
2024.01+dfsg-5
2024.01+dfsg-6
2024.01+dfsg-7

2025.*

2025.01-1
2025.01-2
2025.01-3

Ecosystem specific

{
    "urgency": "unimportant"
}

Database specific

source

"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2018-1000205.json"

Debian:13 / u-boot

Package

Name
u-boot
Purl
pkg:deb/debian/u-boot?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2025.*

2025.01-3

Ecosystem specific

{
    "urgency": "unimportant"
}

Database specific

source

"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2018-1000205.json"

Debian:14 / u-boot

Package

Name
u-boot
Purl
pkg:deb/debian/u-boot?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2025.*

2025.01-3

Ecosystem specific

{
    "urgency": "unimportant"
}

Database specific

source

"https://storage.googleapis.com/osv-test-debian-osv/debian-cve-osv/DEBIAN-CVE-2018-1000205.json"