An issue in Das U-Boot through 2019.07. Unbounded memcpy when parsing UDP packet due to net_process_received_packet integer underflow
Reporter | Title | Published | Views | Family All 22 |
---|---|---|---|---|
![]() | CVE-2019-14192 | 31 Jul 201913:15 | – | debiancve |
![]() | CVE-2019-14192 | 31 Jul 201900:00 | – | ubuntucve |
![]() | CVE-2019-14192 | 31 Jul 201912:18 | – | cvelist |
![]() | CVE-2019-14192 | 31 Jul 201913:15 | – | nvd |
![]() | Integer overflow | 31 Jul 201913:15 | – | prion |
![]() | CVE-2019-14192 | 31 Jul 201913:15 | – | osv |
![]() | Photon OS 3.0: U PHSA-2019-3.0-0036 | 23 Jul 202400:00 | – | nessus |
![]() | SUSE SLED15 / SLES15 Security Update : u-boot (SUSE-SU-2020:3282-1) | 9 Dec 202000:00 | – | nessus |
![]() | EulerOS 2.0 SP9 : uboot-tools (EulerOS-SA-2022-1312) | 2 Mar 202200:00 | – | nessus |
![]() | openSUSE Security Update : u-boot (openSUSE-2020-1930) | 17 Nov 202000:00 | – | nessus |
Source | Link |
---|---|
gitlab | www.gitlab.com/u-boot/u-boot |
blog | www.blog.semmle.com/uboot-rce-nfs-vulnerability/ |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo