Memory corruption can occur if an already verified IFS2...
High severity
Unreviewed
Published
Jan 6, 2025
to the GitHub Advisory Database
•
Updated Jan 14, 2025
Description
Published by the National Vulnerability Database
Jan 6, 2025
Published to the GitHub Advisory Database
Jan 6, 2025
Last updated
Jan 14, 2025
Memory corruption can occur if an already verified IFS2 image is overwritten, bypassing boot verification. This allows unauthorized programs to be injected into security-sensitive images, enabling the booting of a tampered IFS2 system image.
References