Page 2 of 28 results (0.012 seconds)

CVSS: 7.8EPSS: 0%CPEs: 3EXPL: 1

Das U-Boot through 2020.01 allows attackers to bypass verified boot restrictions and subsequently boot arbitrary images by providing a crafted FIT image to a system configured to boot the default configuration. Das U-Boot versiones hasta 2020.01, permite a atacantes omitir restricciones de arranque verificadas y posteriormente iniciar imágenes arbitrarias al proporcionar una imagen FIT diseñada a un sistema configurado para iniciar la configuración predeterminada. • http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00030.html http://www.openwall.com/lists/oss-security/2020/03/18/5 https://github.com/u-boot/u-boot/commits/master https://labs.f-secure.com/advisories/das-u-boot-verified-boot-bypass • CWE-20: Improper Input Validation •

CVSS: 10.0EPSS: 0%CPEs: 2EXPL: 0

In Das U-Boot through 2020.01, a double free has been found in the cmd/gpt.c do_rename_gpt_parts() function. Double freeing may result in a write-what-where condition, allowing an attacker to execute arbitrary code. NOTE: this vulnerablity was introduced when attempting to fix a memory leak identified by static analysis. En Das U-Boot hasta versión 2020.01, se ha encontrado una doble liberación en la función do_rename_gpt_parts() del archivo cmd/gpt.c. Una doble liberación puede resultar en una condición write-what-where, permitiendo a un atacante ejecutar código arbitrario. • http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00030.html https://www.mail-archive.com/u-boot%40lists.denx.de/msg354060.html https://www.mail-archive.com/u-boot%40lists.denx.de/msg354114.html • CWE-415: Double Free CWE-787: Out-of-bounds Write •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

An issue was discovered in Das U-Boot through 2019.07. There is an unbounded memcpy with an unvalidated length at nfs_readlink_reply, in the "if" block after calculating the new path length. Se detectó un problema en Das U-Boot hasta versión 2019.07. Se presenta un memcpy ilimitado con una longitud no válida en la función nfs_readlink_reply, en el bloque "if" después de calcular la nueva longitud de ruta (path). • https://blog.semmle.com/uboot-rce-nfs-vulnerability https://gitlab.com/u-boot/u-boot • CWE-787: Out-of-bounds Write •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

An issue was discovered in Das U-Boot through 2019.07. There is an unbounded memcpy when parsing a UDP packet due to a net_process_received_packet integer underflow during an *udp_packet_handler call. Se detectó un problema en Das U-Boot hasta versión 2019.07. Se presenta un memcpy ilimitado al analizar un paquete UDP debido a un desbordamiento de enteros en la función net_process_received_packet durante una llamada de *udp_packet_handler. • https://blog.semmle.com/uboot-rce-nfs-vulnerability https://gitlab.com/u-boot/u-boot • CWE-191: Integer Underflow (Wrap or Wraparound) •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

An issue was discovered in Das U-Boot through 2019.07. There is an unbounded memcpy with a failed length check at nfs_lookup_reply. Se detectó un problema en Das U-Boot hasta versión 2019.07. Se presenta un memcpy ilimitado con una comprobación de longitud fallida en la función nfs_lookup_reply. • https://blog.semmle.com/uboot-rce-nfs-vulnerability https://gitlab.com/u-boot/u-boot • CWE-787: Out-of-bounds Write •