Search CVE reports


Toggle filters

21 – 30 of 46 results


CVE-2020-10648

Low priority

Some fixes available 2 of 4

Das U-Boot through 2020.01 allows attackers to bypass verified boot restrictions and subsequently boot arbitrary images by providing a crafted FIT image to a system configured to boot the default configuration.

1 affected package

u-boot

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
u-boot Not affected Not affected Fixed Fixed
Show less packages

CVE-2019-14204

Low priority

Some fixes available 2 of 5

An issue was discovered in Das U-Boot through 2019.07. There is a stack-based buffer overflow in this nfs_handler reply helper function: nfs_umountall_reply.

1 affected package

u-boot

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
u-boot Not affected Not affected Fixed Fixed
Show less packages

CVE-2019-14203

Low priority

Some fixes available 2 of 5

An issue was discovered in Das U-Boot through 2019.07. There is a stack-based buffer overflow in this nfs_handler reply helper function: nfs_mount_reply.

1 affected package

u-boot

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
u-boot Not affected Not affected Fixed Fixed
Show less packages

CVE-2019-14202

Low priority

Some fixes available 2 of 5

An issue was discovered in Das U-Boot through 2019.07. There is a stack-based buffer overflow in this nfs_handler reply helper function: nfs_readlink_reply.

1 affected package

u-boot

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
u-boot Not affected Not affected Fixed Fixed
Show less packages

CVE-2019-14201

Low priority

Some fixes available 2 of 5

An issue was discovered in Das U-Boot through 2019.07. There is a stack-based buffer overflow in this nfs_handler reply helper function: nfs_lookup_reply.

1 affected package

u-boot

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
u-boot Not affected Not affected Fixed Fixed
Show less packages

CVE-2019-14200

Low priority

Some fixes available 2 of 5

An issue was discovered in Das U-Boot through 2019.07. There is a stack-based buffer overflow in this nfs_handler reply helper function: rpc_lookup_reply.

1 affected package

u-boot

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
u-boot Not affected Not affected Fixed Fixed
Show less packages

CVE-2019-14199

Low priority

Some fixes available 2 of 5

An issue was discovered in Das U-Boot through 2019.07. There is an unbounded memcpy when parsing a UDP packet due to a net_process_received_packet integer underflow during an *udp_packet_handler call.

1 affected package

u-boot

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
u-boot Not affected Not affected Fixed Fixed
Show less packages

CVE-2019-14198

Low priority

Some fixes available 2 of 5

An issue was discovered in Das U-Boot through 2019.07. There is an unbounded memcpy with a failed length check at nfs_read_reply when calling store_block in the NFSv3 case.

1 affected package

u-boot

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
u-boot Not affected Not affected Fixed Fixed
Show less packages

CVE-2019-14197

Low priority

Some fixes available 2 of 5

An issue was discovered in Das U-Boot through 2019.07. There is a read of out-of-bounds data at nfs_read_reply.

1 affected package

u-boot

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
u-boot Not affected Not affected Fixed Fixed
Show less packages

CVE-2019-14196

Low priority

Some fixes available 2 of 5

An issue was discovered in Das U-Boot through 2019.07. There is an unbounded memcpy with a failed length check at nfs_lookup_reply.

1 affected package

u-boot

Package 24.04 LTS 22.04 LTS 20.04 LTS 18.04 LTS
u-boot Not affected Not affected Fixed Fixed
Show less packages