Filtered by vendor Denx
Subscribe
Search
Total
18 CVE
| CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
|---|---|---|---|---|---|
| CVE-2022-34835 | 1 Denx | 1 U-boot | 2022-07-09 | 7.5 HIGH | 9.8 CRITICAL |
| In Das U-Boot through 2022.07-rc5, an integer signedness error and resultant stack-based buffer overflow in the "i2c md" command enables the corruption of the return address pointer of the do_i2c_md function. | |||||
| CVE-2022-30767 | 1 Denx | 1 U-boot | 2022-06-28 | 7.5 HIGH | 9.8 CRITICAL |
| nfs_lookup_reply in net/nfs.c in Das U-Boot through 2022.04 (and through 2022.07-rc2) has an unbounded memcpy with a failed length check, leading to a buffer overflow. NOTE: this issue exists because of an incorrect fix for CVE-2019-14196. | |||||
| CVE-2020-8432 | 2 Denx, Opensuse | 2 U-boot, Leap | 2021-07-21 | 10.0 HIGH | 9.8 CRITICAL |
| In Das U-Boot through 2020.01, a double free has been found in the cmd/gpt.c do_rename_gpt_parts() function. Double freeing may result in a write-what-where condition, allowing an attacker to execute arbitrary code. NOTE: this vulnerablity was introduced when attempting to fix a memory leak identified by static analysis. | |||||
| CVE-2019-14194 | 1 Denx | 1 U-boot | 2020-08-24 | 7.5 HIGH | 9.8 CRITICAL |
| An issue was discovered in Das U-Boot through 2019.07. There is an unbounded memcpy with a failed length check at nfs_read_reply when calling store_block in the NFSv2 case. | |||||
| CVE-2019-14195 | 1 Denx | 1 U-boot | 2020-08-24 | 7.5 HIGH | 9.8 CRITICAL |
| An issue was discovered in Das U-Boot through 2019.07. There is an unbounded memcpy with unvalidated length at nfs_readlink_reply in the "else" block after calculating the new path length. | |||||
| CVE-2019-14196 | 1 Denx | 1 U-boot | 2020-08-24 | 7.5 HIGH | 9.8 CRITICAL |
| An issue was discovered in Das U-Boot through 2019.07. There is an unbounded memcpy with a failed length check at nfs_lookup_reply. | |||||
| CVE-2019-14198 | 1 Denx | 1 U-boot | 2020-08-24 | 7.5 HIGH | 9.8 CRITICAL |
| An issue was discovered in Das U-Boot through 2019.07. There is an unbounded memcpy with a failed length check at nfs_read_reply when calling store_block in the NFSv3 case. | |||||
| CVE-2019-14200 | 1 Denx | 1 U-boot | 2020-08-24 | 7.5 HIGH | 9.8 CRITICAL |
| An issue was discovered in Das U-Boot through 2019.07. There is a stack-based buffer overflow in this nfs_handler reply helper function: rpc_lookup_reply. | |||||
| CVE-2019-14201 | 1 Denx | 1 U-boot | 2020-08-24 | 7.5 HIGH | 9.8 CRITICAL |
| An issue was discovered in Das U-Boot through 2019.07. There is a stack-based buffer overflow in this nfs_handler reply helper function: nfs_lookup_reply. | |||||
| CVE-2019-14202 | 1 Denx | 1 U-boot | 2020-08-24 | 7.5 HIGH | 9.8 CRITICAL |
| An issue was discovered in Das U-Boot through 2019.07. There is a stack-based buffer overflow in this nfs_handler reply helper function: nfs_readlink_reply. | |||||
| CVE-2019-14204 | 1 Denx | 1 U-boot | 2020-08-24 | 7.5 HIGH | 9.8 CRITICAL |
| An issue was discovered in Das U-Boot through 2019.07. There is a stack-based buffer overflow in this nfs_handler reply helper function: nfs_umountall_reply. | |||||
| CVE-2019-14203 | 1 Denx | 1 U-boot | 2020-08-24 | 7.5 HIGH | 9.8 CRITICAL |
| An issue was discovered in Das U-Boot through 2019.07. There is a stack-based buffer overflow in this nfs_handler reply helper function: nfs_mount_reply. | |||||
| CVE-2019-14192 | 1 Denx | 1 U-boot | 2020-08-24 | 7.5 HIGH | 9.8 CRITICAL |
| An issue was discovered in Das U-Boot through 2019.07. There is an unbounded memcpy when parsing a UDP packet due to a net_process_received_packet integer underflow during an nc_input_packet call. | |||||
| CVE-2019-14193 | 1 Denx | 1 U-boot | 2020-08-24 | 7.5 HIGH | 9.8 CRITICAL |
| An issue was discovered in Das U-Boot through 2019.07. There is an unbounded memcpy with an unvalidated length at nfs_readlink_reply, in the "if" block after calculating the new path length. | |||||
| CVE-2019-14199 | 1 Denx | 1 U-boot | 2019-08-02 | 7.5 HIGH | 9.8 CRITICAL |
| An issue was discovered in Das U-Boot through 2019.07. There is an unbounded memcpy when parsing a UDP packet due to a net_process_received_packet integer underflow during an *udp_packet_handler call. | |||||
| CVE-2019-14197 | 1 Denx | 1 U-boot | 2019-08-02 | 6.4 MEDIUM | 9.1 CRITICAL |
| An issue was discovered in Das U-Boot through 2019.07. There is a read of out-of-bounds data at nfs_read_reply. | |||||
| CVE-2019-11059 | 1 Denx | 1 U-boot | 2019-05-13 | 7.5 HIGH | 9.8 CRITICAL |
| Das U-Boot 2016.11-rc1 through 2019.04 mishandles the ext4 64-bit extension, resulting in a buffer overflow. | |||||
| CVE-2018-18439 | 1 Denx | 2 Das U-boot, Das U-boot Firmware | 2019-01-02 | 10.0 HIGH | 9.8 CRITICAL |
| DENX U-Boot through 2018.09-rc1 has a remotely exploitable buffer overflow via a malicious TFTP server because TFTP traffic is mishandled. Also, local exploitation can occur via a crafted kernel image. | |||||
