Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

If the chipicopwn logo appears the vulnerability should still be there? #9

Open
flecke-m opened this issue Sep 26, 2024 · 0 comments
Open

Comments

@flecke-m
Copy link

flecke-m commented Sep 26, 2024

Hi,

this is more a question than an issue.

I haven't soldered so far the UART to reach the console output, because I just wanted to check if my device (mfg date 04/2022) still has the vulnerability in u-boot. With the code from the fw-2022_01 branch the chipicopwn logo appears on the nest hub (so I though, hey it is still working).

Also it seems that the fatload command at least gets executed, because when I swap the pico to the USB Stick with the Ubuntu image and updated boot images, the screen turns black, the G logo appears but then nothing happens afterwards. It takes quite some time then the screen turns black and that its.

Could it be that there is another check on the signature of the new boot images being implemented?

I will get the UART Shell in the next couple of weeks, but maybe there is some experience already available.

Thank you.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant