[binary] Zynq-7000 Secure Boot Bypass and Compiler-Created Bugs

Published: Feb. 24, 2022, 1 a.m.

Links and vulnerability summaries for this episode are available at: https://dayzerosec.com/podcast/zynq-7000-secure-boot-bypass-and-compiler-created-bugs.html

\n

Just one vulnerability this week, a secure boot bypass, and some research into detecting compiler introduced bugs. Ending the week with a discussion about how to learn fuzzing.

\n

[00:00:58] Spot the Vuln - All Inclusive HMAC

\n

[00:03:47] Zynq-7000 Secure Boot Bypass [CVE-2021-44850]

\n

[00:19:32] Cross-Architecture Testing for Compiler-Introduced Security Bugs

\n

[00:35:02] Question: Learning to Fuzz

\n

[01:03:00] tmp.0ut v2

\n

The DAY[0] Podcast episodes are streamed live on Twitch (@dayzerosec) twice a week:

\n

    \n\t
  • Mondays at 3:00pm Eastern (Boston) we focus on web and more bug bounty style vulnerabilities
  • \n\t
  • Tuesdays at 7:00pm Eastern (Boston) we focus on lower-level vulnerabilities and exploits.
  • \n
\n

The Video archive can be found on our Youtube channel: https://www.youtube.com/c/dayzerosec

\n

You can also join our discord: https://discord.gg/daTxTK9

\n

Or follow us on Twitter (@dayzerosec) to know when new releases are coming.