Page 2 of 36 results (0.002 seconds)

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 1

Das U-Boot 2022.01 has a Buffer Overflow, a different issue than CVE-2022-30552. Das U-Boot 2022.01, presenta un desbordamiento del búfer, un problema diferente de CVE-2022-30552 • https://github.com/u-boot/u-boot/tags https://research.nccgroup.com/2022/06/03/technical-advisory-multiple-vulnerabilities-in-u-boot-cve-2022-30790-cve-2022-30552 • CWE-787: Out-of-bounds Write •

CVSS: 9.8EPSS: 0%CPEs: 4EXPL: 1

nfs_lookup_reply in net/nfs.c in Das U-Boot through 2022.04 (and through 2022.07-rc2) has an unbounded memcpy with a failed length check, leading to a buffer overflow. NOTE: this issue exists because of an incorrect fix for CVE-2019-14196. La función nfs_lookup_reply en el archivo net/nfs.c en Das U-Boot hasta 2022.04 (y hasta 2022.07-rc2), presenta un memcpy no limitado con una comprobación de longitud fallida, conllevando a un desbordamiento del búfer. NOTA: este problema se presenta debido a una corrección incorrecta de CVE-2019-14196 • https://github.com/u-boot/u-boot/commit/5d14ee4e53a81055d34ba280cb8fd90330f22a96 https://lists.denx.de/pipermail/u-boot/2022-May/483952.html https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DF62MVMH3QUGMBDCB3DY2ERQ6EBHTADB https://securitylab.github.com/research/uboot-rce-nfs-vulnerability https://source.denx.de/u-boot/u-boot/-/commit/bdbf7a05e26f3c5fd437c99e2755ffde186ddc80 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

The boot loader in Das U-Boot before 2021.04-rc2 mishandles use of unit addresses in a FIT. El cargador de arranque en Das U-Boot versiones anteriores a 2021.04-rc2, maneja inapropiadamente el uso de direcciones de unidad en un FIT • https://github.com/u-boot/u-boot/commit/3f04db891a353f4b127ed57279279f851c6b4917 https://github.com/u-boot/u-boot/commit/79af75f7776fc20b0d7eb6afe1e27c00fdb4b9b4 https://github.com/u-boot/u-boot/commit/b6f4c757959f8850e1299a77c8e5713da78e8ec0 •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

The boot loader in Das U-Boot before 2021.04-rc2 mishandles a modified FIT. El cargador de arranque en Das U-Boot versiones anteriores a 2021.04-rc2, maneja inapropiadamente un FIT modificado • https://github.com/u-boot/u-boot/commit/6f3c2d8aa5e6cbd80b5e869bbbddecb66c329d01 https://github.com/u-boot/u-boot/commit/8a7d4cf9820ea16fabd25a6379351b4dc291204b https://github.com/u-boot/u-boot/commit/b6f4c757959f8850e1299a77c8e5713da78e8ec0 •

CVSS: 7.8EPSS: 0%CPEs: 3EXPL: 1

Das U-Boot through 2020.01 allows attackers to bypass verified boot restrictions and subsequently boot arbitrary images by providing a crafted FIT image to a system configured to boot the default configuration. Das U-Boot versiones hasta 2020.01, permite a atacantes omitir restricciones de arranque verificadas y posteriormente iniciar imágenes arbitrarias al proporcionar una imagen FIT diseñada a un sistema configurado para iniciar la configuración predeterminada. • http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00030.html http://www.openwall.com/lists/oss-security/2020/03/18/5 https://github.com/u-boot/u-boot/commits/master https://labs.f-secure.com/advisories/das-u-boot-verified-boot-bypass • CWE-20: Improper Input Validation •