Denx

U-boot

44 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.54%
  • Veröffentlicht 31.07.2019 13:15:13
  • Zuletzt bearbeitet 21.11.2024 04:26:10

An issue was discovered in Das U-Boot through 2019.07. There is an unbounded memcpy when parsing a UDP packet due to a net_process_received_packet integer underflow during an *udp_packet_handler call.

  • EPSS 0.44%
  • Veröffentlicht 31.07.2019 13:15:13
  • Zuletzt bearbeitet 21.11.2024 04:26:10

An issue was discovered in Das U-Boot through 2019.07. There is a stack-based buffer overflow in this nfs_handler reply helper function: rpc_lookup_reply.

  • EPSS 0.44%
  • Veröffentlicht 31.07.2019 13:15:13
  • Zuletzt bearbeitet 21.11.2024 04:26:10

An issue was discovered in Das U-Boot through 2019.07. There is a stack-based buffer overflow in this nfs_handler reply helper function: nfs_lookup_reply.

  • EPSS 0.44%
  • Veröffentlicht 31.07.2019 13:15:13
  • Zuletzt bearbeitet 21.11.2024 04:26:11

An issue was discovered in Das U-Boot through 2019.07. There is a stack-based buffer overflow in this nfs_handler reply helper function: nfs_readlink_reply.

  • EPSS 0.44%
  • Veröffentlicht 31.07.2019 13:15:13
  • Zuletzt bearbeitet 21.11.2024 04:26:11

An issue was discovered in Das U-Boot through 2019.07. There is a stack-based buffer overflow in this nfs_handler reply helper function: nfs_mount_reply.

  • EPSS 0.16%
  • Veröffentlicht 29.07.2019 15:15:12
  • Zuletzt bearbeitet 21.11.2024 04:24:11

A crafted self-referential DOS partition table will cause all Das U-Boot versions through 2019.07-rc4 to infinitely recurse, causing the stack to grow infinitely and eventually either crash or overwrite other data.

  • EPSS 0.44%
  • Veröffentlicht 10.05.2019 20:29:00
  • Zuletzt bearbeitet 21.11.2024 04:20:27

Das U-Boot 2016.11-rc1 through 2019.04 mishandles the ext4 64-bit extension, resulting in a buffer overflow.

  • EPSS 0.32%
  • Veröffentlicht 03.05.2019 13:29:00
  • Zuletzt bearbeitet 21.11.2024 04:21:36

gen_rand_uuid in lib/uuid.c in Das U-Boot v2014.04 through v2019.04 lacks an srand call, which allows attackers to determine UUID values in scenarios where CONFIG_RANDOM_UUID is enabled, and Das U-Boot is relied upon for UUID values of a GUID Partiti...

Exploit
  • EPSS 0.03%
  • Veröffentlicht 21.03.2019 17:29:00
  • Zuletzt bearbeitet 21.11.2024 04:06:24

An exploitable vulnerability exists in the verified boot protection of the Das U-Boot from version 2013.07-rc1 to 2014.07-rc2. The affected versions lack proper FIT signature enforcement, which allows an attacker to bypass U-Boot's verified boot and ...

Exploit
  • EPSS 0.05%
  • Veröffentlicht 20.11.2018 19:29:00
  • Zuletzt bearbeitet 21.11.2024 03:55:56

DENX U-Boot through 2018.09-rc1 has a locally exploitable buffer overflow via a crafted kernel image because filesystem loading is mishandled.