Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2019-14195

Опубликовано: 31 июл. 2019
Источник: debian
EPSS Низкий

Описание

An issue was discovered in Das U-Boot through 2019.07. There is an unbounded memcpy with unvalidated length at nfs_readlink_reply in the "else" block after calculating the new path length.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
u-bootfixed2020.01+dfsg-1package
u-bootignoredbusterpackage
u-bootno-dsastretchpackage
u-bootno-dsajessiepackage

Примечания

  • https://blog.semmle.com/uboot-rce-nfs-vulnerability/

  • https://gitlab.denx.de/u-boot/u-boot/commit/cf3a4f1e86ecdd24f87b615051b49d8e1968c230

EPSS

Процентиль: 45%
0.00223
Низкий

Связанные уязвимости

CVSS3: 9.8
ubuntu
больше 6 лет назад

An issue was discovered in Das U-Boot through 2019.07. There is an unbounded memcpy with unvalidated length at nfs_readlink_reply in the "else" block after calculating the new path length.

CVSS3: 9.8
nvd
больше 6 лет назад

An issue was discovered in Das U-Boot through 2019.07. There is an unbounded memcpy with unvalidated length at nfs_readlink_reply in the "else" block after calculating the new path length.

msrc
5 месяцев назад

An issue was discovered in Das U-Boot through 2019.07. There is an unbounded memcpy with unvalidated length at nfs_readlink_reply in the "else" block after calculating the new path length.

github
больше 3 лет назад

An issue was discovered in Das U-Boot through 2019.07. There is an unbounded memcpy with unvalidated length at nfs_readlink_reply in the "else" block after calculating the new path length.

CVSS3: 9.8
fstec
больше 6 лет назад

Уязвимость функции nfs_readlink_reply компонента net/nfs.c загрузчика U-Boot, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании

EPSS

Процентиль: 45%
0.00223
Низкий