Filtered by vendor Denx
Subscriptions
Total
43 CVE
CVE | Vendors | Products | Updated | CVSS v3.1 |
---|---|---|---|---|
CVE-2019-14202 | 1 Denx | 1 U-boot | 2024-11-21 | N/A |
An issue was discovered in Das U-Boot through 2019.07. There is a stack-based buffer overflow in this nfs_handler reply helper function: nfs_readlink_reply. | ||||
CVE-2019-14201 | 1 Denx | 1 U-boot | 2024-11-21 | N/A |
An issue was discovered in Das U-Boot through 2019.07. There is a stack-based buffer overflow in this nfs_handler reply helper function: nfs_lookup_reply. | ||||
CVE-2019-14200 | 1 Denx | 1 U-boot | 2024-11-21 | N/A |
An issue was discovered in Das U-Boot through 2019.07. There is a stack-based buffer overflow in this nfs_handler reply helper function: rpc_lookup_reply. | ||||
CVE-2019-14199 | 1 Denx | 1 U-boot | 2024-11-21 | N/A |
An issue was discovered in Das U-Boot through 2019.07. There is an unbounded memcpy when parsing a UDP packet due to a net_process_received_packet integer underflow during an *udp_packet_handler call. | ||||
CVE-2019-14198 | 1 Denx | 1 U-boot | 2024-11-21 | N/A |
An issue was discovered in Das U-Boot through 2019.07. There is an unbounded memcpy with a failed length check at nfs_read_reply when calling store_block in the NFSv3 case. | ||||
CVE-2019-14197 | 1 Denx | 1 U-boot | 2024-11-21 | N/A |
An issue was discovered in Das U-Boot through 2019.07. There is a read of out-of-bounds data at nfs_read_reply. | ||||
CVE-2019-14196 | 1 Denx | 1 U-boot | 2024-11-21 | N/A |
An issue was discovered in Das U-Boot through 2019.07. There is an unbounded memcpy with a failed length check at nfs_lookup_reply. | ||||
CVE-2019-14195 | 1 Denx | 1 U-boot | 2024-11-21 | N/A |
An issue was discovered in Das U-Boot through 2019.07. There is an unbounded memcpy with unvalidated length at nfs_readlink_reply in the "else" block after calculating the new path length. | ||||
CVE-2019-14194 | 1 Denx | 1 U-boot | 2024-11-21 | N/A |
An issue was discovered in Das U-Boot through 2019.07. There is an unbounded memcpy with a failed length check at nfs_read_reply when calling store_block in the NFSv2 case. | ||||
CVE-2019-14193 | 1 Denx | 1 U-boot | 2024-11-21 | N/A |
An issue was discovered in Das U-Boot through 2019.07. There is an unbounded memcpy with an unvalidated length at nfs_readlink_reply, in the "if" block after calculating the new path length. | ||||
CVE-2019-14192 | 1 Denx | 1 U-boot | 2024-11-21 | N/A |
An issue was discovered in Das U-Boot through 2019.07. There is an unbounded memcpy when parsing a UDP packet due to a net_process_received_packet integer underflow during an nc_input_packet call. | ||||
CVE-2019-13106 | 2 Denx, Opensuse | 2 U-boot, Leap | 2024-11-21 | 7.8 High |
Das U-Boot versions 2016.09 through 2019.07-rc4 can memset() too much data while reading a crafted ext4 filesystem, which results in a stack buffer overflow and likely code execution. | ||||
CVE-2019-13105 | 1 Denx | 1 U-boot | 2024-11-21 | N/A |
Das U-Boot versions 2019.07-rc1 through 2019.07-rc4 can double-free a cached block of data when listing files in a crafted ext4 filesystem. | ||||
CVE-2019-13104 | 2 Denx, Opensuse | 2 U-boot, Leap | 2024-11-21 | 7.8 High |
In Das U-Boot versions 2016.11-rc1 through 2019.07-rc4, an underflow can cause memcpy() to overwrite a very large amount of data (including the whole stack) while reading a crafted ext4 filesystem. | ||||
CVE-2019-13103 | 1 Denx | 1 U-boot | 2024-11-21 | 7.1 High |
A crafted self-referential DOS partition table will cause all Das U-Boot versions through 2019.07-rc4 to infinitely recurse, causing the stack to grow infinitely and eventually either crash or overwrite other data. | ||||
CVE-2019-11690 | 1 Denx | 1 U-boot | 2024-11-21 | N/A |
gen_rand_uuid in lib/uuid.c in Das U-Boot v2014.04 through v2019.04 lacks an srand call, which allows attackers to determine UUID values in scenarios where CONFIG_RANDOM_UUID is enabled, and Das U-Boot is relied upon for UUID values of a GUID Partition Table of a boot device. | ||||
CVE-2019-11059 | 1 Denx | 1 U-boot | 2024-11-21 | N/A |
Das U-Boot 2016.11-rc1 through 2019.04 mishandles the ext4 64-bit extension, resulting in a buffer overflow. | ||||
CVE-2018-3968 | 1 Denx | 1 U-boot | 2024-11-21 | 7.0 High |
An exploitable vulnerability exists in the verified boot protection of the Das U-Boot from version 2013.07-rc1 to 2014.07-rc2. The affected versions lack proper FIT signature enforcement, which allows an attacker to bypass U-Boot's verified boot and execute an unsigned kernel, embedded in a legacy image format. To trigger this vulnerability, a local attacker needs to be able to supply the image to boot. | ||||
CVE-2018-18440 | 1 Denx | 1 U-boot | 2024-11-21 | N/A |
DENX U-Boot through 2018.09-rc1 has a locally exploitable buffer overflow via a crafted kernel image because filesystem loading is mishandled. | ||||
CVE-2018-18439 | 1 Denx | 1 U-boot | 2024-11-21 | 9.8 Critical |
DENX U-Boot through 2018.09-rc1 has a remotely exploitable buffer overflow via a malicious TFTP server because TFTP traffic is mishandled. Also, local exploitation can occur via a crafted kernel image. |