First published: Tue Aug 06 2019(Updated: )
Das U-Boot versions 2016.09 through 2019.07-rc4 can memset() too much data while reading a crafted ext4 filesystem, which results in a stack buffer overflow and likely code execution.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
DENX U-Boot | >=2016.09<=2019.04 | |
DENX U-Boot | =2019.07 | |
DENX U-Boot | =2019.07-rc1 | |
DENX U-Boot | =2019.07-rc2 | |
DENX U-Boot | =2019.07-rc3 | |
DENX U-Boot | =2019.07-rc4 | |
openSUSE Leap | =15.0 | |
openSUSE Leap | =15.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-13106 is a vulnerability in Das U-Boot versions 2016.09 through 2019.07-rc4 that can lead to a stack buffer overflow and likely code execution.
CVE-2019-13106 has a severity rating of 7.8 (high).
Das U-Boot versions 2016.09 through 2019.07-rc4 are affected by CVE-2019-13106.
CVE-2019-13106 can be exploited by reading a crafted ext4 filesystem that causes a stack buffer overflow.
Yes, you can find more information about CVE-2019-13106 at the following links: [Reference 1](http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00002.html), [Reference 2](http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00004.html), [Reference 3](https://gist.github.com/deephooloovoo/d91b81a1674b4750e662dfae93804d75).