Pengutronix Barebox through v2020.05.0 has an out-of-bounds read in nfs_read_reply in net/nfs.c because a field of an incoming network packet is directly used as a length field without any bounds check.
References
Link | Resource |
---|---|
https://git.pengutronix.de/cgit/barebox/commit/net/nfs.c?h=next&id=c0f0cbd1759a6ca6cbda4001dff5764f6633c825 | Patch Third Party Advisory |
https://git.pengutronix.de/cgit/barebox/commit/net/nfs.c?h=next&id=c0f0cbd1759a6ca6cbda4001dff5764f6633c825 | Patch Third Party Advisory |
Configurations
History
21 Nov 2024, 05:02
Type | Values Removed | Values Added |
---|---|---|
References | () https://git.pengutronix.de/cgit/barebox/commit/net/nfs.c?h=next&id=c0f0cbd1759a6ca6cbda4001dff5764f6633c825 - Patch, Third Party Advisory |
Information
Published : 2020-06-07 20:15
Updated : 2024-11-21 05:02
NVD link : CVE-2020-13910
Mitre link : CVE-2020-13910
CVE.ORG link : CVE-2020-13910
JSON object : View
Products Affected
pengutronix
- barebox
CWE
CWE-125
Out-of-bounds Read