Denx

U-boot

44 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.04%
  • Published 01.07.2022 12:15:08
  • Last modified 21.11.2024 07:07:32

Das U-Boot from v2020.10 to v2022.07-rc3 was discovered to contain an out-of-bounds write via the function sqfs_readdir().

Exploit
  • EPSS 0.23%
  • Published 30.06.2022 00:15:08
  • Last modified 21.11.2024 07:10:17

In Das U-Boot through 2022.07-rc5, an integer signedness error and resultant stack-based buffer overflow in the "i2c md" command enables the corruption of the return address pointer of the do_i2c_md function.

Exploit
  • EPSS 0.17%
  • Published 08.06.2022 13:15:08
  • Last modified 21.11.2024 07:03:23

Das U-Boot 2022.01 has a Buffer Overflow, a different issue than CVE-2022-30552.

  • EPSS 0.07%
  • Published 08.06.2022 13:15:08
  • Last modified 21.11.2024 07:02:55

Das U-Boot 2022.01 has a Buffer Overflow.

Exploit
  • EPSS 0.14%
  • Published 16.05.2022 03:15:07
  • Last modified 21.11.2024 07:03:20

nfs_lookup_reply in net/nfs.c in Das U-Boot through 2022.04 (and through 2022.07-rc2) has an unbounded memcpy with a failed length check, leading to a buffer overflow. NOTE: this issue exists because of an incorrect fix for CVE-2019-14196.

  • EPSS 0.05%
  • Published 17.02.2021 23:15:13
  • Last modified 21.11.2024 05:57:23

The boot loader in Das U-Boot before 2021.04-rc2 mishandles use of unit addresses in a FIT.

  • EPSS 0.05%
  • Published 17.02.2021 23:15:13
  • Last modified 21.11.2024 05:57:20

The boot loader in Das U-Boot before 2021.04-rc2 mishandles a modified FIT.

Exploit
  • EPSS 0.12%
  • Published 19.03.2020 14:15:12
  • Last modified 21.11.2024 04:55:46

Das U-Boot through 2020.01 allows attackers to bypass verified boot restrictions and subsequently boot arbitrary images by providing a crafted FIT image to a system configured to boot the default configuration.

  • EPSS 1.21%
  • Published 29.01.2020 19:15:14
  • Last modified 21.11.2024 05:38:50

In Das U-Boot through 2020.01, a double free has been found in the cmd/gpt.c do_rename_gpt_parts() function. Double freeing may result in a write-what-where condition, allowing an attacker to execute arbitrary code. NOTE: this vulnerablity was introd...

  • EPSS 0.85%
  • Published 06.08.2019 20:15:12
  • Last modified 21.11.2024 04:24:11

Das U-Boot versions 2016.09 through 2019.07-rc4 can memset() too much data while reading a crafted ext4 filesystem, which results in a stack buffer overflow and likely code execution.