First published: Wed Jul 31 2019(Updated: )
An issue was discovered in Das U-Boot through 2019.07. There is an unbounded memcpy when parsing a UDP packet due to a net_process_received_packet integer underflow during an *udp_packet_handler call.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
DENX U-Boot | <=2019.07 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-14199 is a vulnerability in Das U-Boot through version 2019.07 that allows for a remote code execution (RCE) via an integer underflow in the net_process_received_packet function during an *udp_packet_handler call.
The DENX U-Boot software through version 2019.07 is affected by CVE-2019-14199.
CVE-2019-14199 has a severity level of critical with a score of 9.8.
Updating to a version of Das U-Boot later than 2019.07 will fix the vulnerability.
More information about CVE-2019-14199 can be found at https://blog.semmle.com/uboot-rce-nfs-vulnerability/ and https://gitlab.com/u-boot/u-boot.