CVE-2022-33967
- EPSS 0.11%
- Veröffentlicht 20.07.2022 07:15:08
- Zuletzt bearbeitet 03.11.2025 20:15:54
squashfs filesystem implementation of U-Boot versions from v2020.10-rc2 to v2022.07-rc5 contains a heap-based buffer overflow vulnerability due to a defect in the metadata reading process. Loading a specially crafted squashfs image may lead to a deni...
CVE-2022-33103
- EPSS 0.06%
- Veröffentlicht 01.07.2022 12:15:08
- Zuletzt bearbeitet 03.11.2025 20:15:54
Das U-Boot from v2020.10 to v2022.07-rc3 was discovered to contain an out-of-bounds write via the function sqfs_readdir().
CVE-2022-34835
- EPSS 0.31%
- Veröffentlicht 30.06.2022 00:15:08
- Zuletzt bearbeitet 03.11.2025 20:15:54
In Das U-Boot through 2022.07-rc5, an integer signedness error and resultant stack-based buffer overflow in the "i2c md" command enables the corruption of the return address pointer of the do_i2c_md function.
CVE-2022-30790
- EPSS 0.34%
- Veröffentlicht 08.06.2022 13:15:08
- Zuletzt bearbeitet 03.11.2025 20:15:54
Das U-Boot 2022.01 has a Buffer Overflow, a different issue than CVE-2022-30552.
CVE-2022-30552
- EPSS 0.08%
- Veröffentlicht 08.06.2022 13:15:08
- Zuletzt bearbeitet 03.11.2025 20:15:54
Das U-Boot 2022.01 has a Buffer Overflow.
CVE-2022-30767
- EPSS 0.15%
- Veröffentlicht 16.05.2022 03:15:07
- Zuletzt bearbeitet 03.11.2025 20:15:54
nfs_lookup_reply in net/nfs.c in Das U-Boot through 2022.04 (and through 2022.07-rc2) has an unbounded memcpy with a failed length check, leading to a buffer overflow. NOTE: this issue exists because of an incorrect fix for CVE-2019-14196.
CVE-2021-27138
- EPSS 0.06%
- Veröffentlicht 17.02.2021 23:15:13
- Zuletzt bearbeitet 03.11.2025 19:15:40
The boot loader in Das U-Boot before 2021.04-rc2 mishandles use of unit addresses in a FIT.
CVE-2021-27097
- EPSS 0.06%
- Veröffentlicht 17.02.2021 23:15:13
- Zuletzt bearbeitet 03.11.2025 19:15:40
The boot loader in Das U-Boot before 2021.04-rc2 mishandles a modified FIT.
CVE-2020-10648
- EPSS 0.12%
- Veröffentlicht 19.03.2020 14:15:12
- Zuletzt bearbeitet 21.11.2024 04:55:46
Das U-Boot through 2020.01 allows attackers to bypass verified boot restrictions and subsequently boot arbitrary images by providing a crafted FIT image to a system configured to boot the default configuration.
- EPSS 1.96%
- Veröffentlicht 29.01.2020 19:15:14
- Zuletzt bearbeitet 21.11.2024 05:38:50
In Das U-Boot through 2020.01, a double free has been found in the cmd/gpt.c do_rename_gpt_parts() function. Double freeing may result in a write-what-where condition, allowing an attacker to execute arbitrary code. NOTE: this vulnerablity was introd...