{ "schema_version": "1.4.0", "id": "GHSA-j2v2-fr8j-439j", "modified": "2022-05-17T03:51:10Z", "published": "2022-05-17T03:51:10Z", "aliases": [ "CVE-2014-0973" ], "details": "The image_verify function in platform/msm_shared/image_verify.c in the Little Kernel (LK) bootloader, as distributed with Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, does not check whether a certain digest size is consistent with the RSA_public_decrypt API specification, which makes it easier for attackers to bypass boot-image authentication requirements via trailing data.", "severity": [], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-0973" }, { "type": "WEB", "url": "https://www.codeaurora.org/projects/security-advisories/incomplete-signature-parsing-during-boot-image-authentication-leads-to-signature-forgery-cve-2014-0973" }, { "type": "WEB", "url": "http://source.android.com/security/bulletin/2016-07-01.html" } ], "database_specific": { "cwe_ids": [ "CWE-287" ], "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2014-08-25T01:55:00Z" } }