There is an unbounded memcpy with an unvalidated length at nfs_readlink_reply, in the "if" block after calculating the new path length.Īn issue was discovered in Das U-Boot through 2019.07.
There is an unbounded memcpy when parsing a UDP packet due to a net_process_received_packet integer underflow during an nc_input_packet call.Īn issue was discovered in Das U-Boot through 2019.07. There is an unbounded memcpy with a failed length check at nfs_read_reply when calling store_block in the NFSv3 case.Ī crafted self-referential DOS partition table will cause all Das U-Boot versions through 2019.07-rc4 to infinitely recurse, causing the stack to grow infinitely and eventually either crash or overwrite other data.Īn issue was discovered in Das U-Boot through 2019.07. There is a stack-based buffer overflow in this nfs_handler reply helper function: nfs_umountall_reply.Īn issue was discovered in Das U-Boot through 2019.07.
There is a stack-based buffer overflow in this nfs_handler reply helper function: nfs_mount_reply.Īn issue was discovered in Das U-Boot through 2019.07. This attack appear to be exploitable via Specially crafted FIT image and special device memory functionality.Īn issue was discovered in Das U-Boot through 2019.07. U-Boot contains a CWE-20: Improper Input Validation vulnerability in Verified boot signature validation that can result in Bypass verified boot. The boot loader in Das U-Boot before 2021.04-rc2 mishandles a modified FIT. The boot loader in Das U-Boot before 2021.04-rc2 mishandles use of unit addresses in a FIT. NOTE: this vulnerablity was introduced when attempting to fix a memory leak identified by static analysis.ĭas U-Boot through 2020.01 allows attackers to bypass verified boot restrictions and subsequently boot arbitrary images by providing a crafted FIT image to a system configured to boot the default configuration.
Double freeing may result in a write-what-where condition, allowing an attacker to execute arbitrary code.
#DAS U BOOT FREE#
In Das U-Boot through 2020.01, a double free has been found in the cmd/gpt.c do_rename_gpt_parts() function. In Das U-Boot versions 2016.11-rc1 through 2019.07-rc4, an underflow can cause memcpy() to overwrite a very large amount of data (including the whole stack) while reading a crafted ext4 filesystem. To trigger this vulnerability, a local attacker needs to be able to supply the image to boot. The affected versions lack proper FIT signature enforcement, which allows an attacker to bypass U-Boot's verified boot and execute an unsigned kernel, embedded in a legacy image format. NOTE: this issue exists because of an incorrect fix for CVE-2019-14196.ĭas U-Boot 2022.01 has a Buffer Overflow, a different issue than CVE-2022-30552.ĭas U-Boot 2022.01 has a Buffer Overflow.Īn exploitable vulnerability exists in the verified boot protection of the Das U-Boot from version 2013.07-rc1 to 2014.07-rc2. Nfs_lookup_reply in net/nfs.c in Das U-Boot through 2022.04 (and through 2022.07-rc2) has an unbounded memcpy with a failed length check, leading to a buffer overflow.