Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
denx u-boot vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2022-30767
nfs_lookup_reply in net/nfs.c in Das U-Boot up to and including 2022.04 (and up to and including 2022.07-rc2) has an unbounded memcpy with a failed length check, leading to a buffer overflow. NOTE: this issue exists because of an incorrect fix for CVE-2019-14196.
Denx U-boot
Denx U-boot 2022.07
Fedoraproject Fedora 36
6.8
CVSSv2
CVE-2020-10648
Das U-Boot up to and including 2020.01 allows malicious users to bypass verified boot restrictions and subsequently boot arbitrary images by providing a crafted FIT image to a system configured to boot the default configuration.
Denx U-boot
Denx U-boot 2020.01
Opensuse Leap 15.2
8.3
CVSSv2
CVE-2019-13106
Das U-Boot versions 2016.09 up to and including 2019.07-rc4 can memset() too much data while reading a crafted ext4 filesystem, which results in a stack buffer overflow and likely code execution.
Denx U-boot 2019.07
Denx U-boot
Opensuse Leap 15.0
Opensuse Leap 15.1
6.8
CVSSv2
CVE-2019-13104
In Das U-Boot versions 2016.11-rc1 up to and including 2019.07-rc4, an underflow can cause memcpy() to overwrite a very large amount of data (including the whole stack) while reading a crafted ext4 filesystem.
Denx U-boot 2019.07
Denx U-boot
Opensuse Leap 15.0
Opensuse Leap 15.1
4.3
CVSSv2
CVE-2018-1000205
U-Boot contains a CWE-20: Improper Input Validation vulnerability in Verified boot signature validation that can result in Bypass verified boot. This attack appear to be exploitable via Specially crafted FIT image and special device memory functionality.
Denx U-boot
2.1
CVSSv2
CVE-2017-3225
Das U-Boot is a device bootloader that can read its configuration from an AES encrypted file. For devices utilizing this environment encryption mode, U-Boot's use of a zero initialization vector may allow attacks against the underlying cryptographic implementation and allow ...
Denx U-boot
4.4
CVSSv2
CVE-2017-3226
Das U-Boot is a device bootloader that can read its configuration from an AES encrypted file. Devices that make use of Das U-Boot's AES-CBC encryption feature using environment encryption (i.e., setting the configuration parameter CONFIG_ENV_AES=y) read environment variables...
Denx U-boot
7.5
CVSSv2
CVE-2019-14192
An issue exists in Das U-Boot up to and including 2019.07. There is an unbounded memcpy when parsing a UDP packet due to a net_process_received_packet integer underflow during an nc_input_packet call.
Denx U-boot
1 Github repository
7.5
CVSSv2
CVE-2019-14193
An issue exists in Das U-Boot up to and including 2019.07. There is an unbounded memcpy with an unvalidated length at nfs_readlink_reply, in the "if" block after calculating the new path length.
Denx U-boot
7.5
CVSSv2
CVE-2019-14194
An issue exists in Das U-Boot up to and including 2019.07. There is an unbounded memcpy with a failed length check at nfs_read_reply when calling store_block in the NFSv2 case.
Denx U-boot
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4654
CVE-2023-49606
encryption
NULL pointer dereference
CVE-2024-4439
CVE-2024-4649
race condition
CVE-2024-27202
CVE-2024-34566
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
NEXT »