"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-07-31 13:00:57 +00:00
parent d23b4e9ee6
commit d242442583
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
28 changed files with 931 additions and 30 deletions

View File

@ -1,7 +1,8 @@
{
"CVE_data_meta": {
"ID": "CVE-2019-10343",
"ASSIGNER": "jenkinsci-cert@googlegroups.com"
"ASSIGNER": "jenkinsci-cert@googlegroups.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -53,7 +54,8 @@
"reference_data": [
{
"url": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1279",
"refsource": "CONFIRM"
"refsource": "MISC",
"name": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1279"
}
]
}

View File

@ -1,7 +1,8 @@
{
"CVE_data_meta": {
"ID": "CVE-2019-10344",
"ASSIGNER": "jenkinsci-cert@googlegroups.com"
"ASSIGNER": "jenkinsci-cert@googlegroups.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -53,7 +54,8 @@
"reference_data": [
{
"url": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1290",
"refsource": "CONFIRM"
"refsource": "MISC",
"name": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1290"
}
]
}

View File

@ -1,7 +1,8 @@
{
"CVE_data_meta": {
"ID": "CVE-2019-10345",
"ASSIGNER": "jenkinsci-cert@googlegroups.com"
"ASSIGNER": "jenkinsci-cert@googlegroups.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -53,7 +54,8 @@
"reference_data": [
{
"url": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1303",
"refsource": "CONFIRM"
"refsource": "MISC",
"name": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1303"
}
]
}

View File

@ -1,7 +1,8 @@
{
"CVE_data_meta": {
"ID": "CVE-2019-10355",
"ASSIGNER": "jenkinsci-cert@googlegroups.com"
"ASSIGNER": "jenkinsci-cert@googlegroups.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -53,7 +54,8 @@
"reference_data": [
{
"url": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1465%20(1)",
"refsource": "CONFIRM"
"refsource": "MISC",
"name": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1465%20(1)"
}
]
}

View File

@ -1,7 +1,8 @@
{
"CVE_data_meta": {
"ID": "CVE-2019-10356",
"ASSIGNER": "jenkinsci-cert@googlegroups.com"
"ASSIGNER": "jenkinsci-cert@googlegroups.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -53,7 +54,8 @@
"reference_data": [
{
"url": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1465%20(2)",
"refsource": "CONFIRM"
"refsource": "MISC",
"name": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1465%20(2)"
}
]
}

View File

@ -1,7 +1,8 @@
{
"CVE_data_meta": {
"ID": "CVE-2019-10357",
"ASSIGNER": "jenkinsci-cert@googlegroups.com"
"ASSIGNER": "jenkinsci-cert@googlegroups.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -53,7 +54,8 @@
"reference_data": [
{
"url": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY1422",
"refsource": "CONFIRM"
"refsource": "MISC",
"name": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY1422"
}
]
}

View File

@ -1,7 +1,8 @@
{
"CVE_data_meta": {
"ID": "CVE-2019-10358",
"ASSIGNER": "jenkinsci-cert@googlegroups.com"
"ASSIGNER": "jenkinsci-cert@googlegroups.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -53,7 +54,8 @@
"reference_data": [
{
"url": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-713",
"refsource": "CONFIRM"
"refsource": "MISC",
"name": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-713"
}
]
}

View File

@ -1,7 +1,8 @@
{
"CVE_data_meta": {
"ID": "CVE-2019-10359",
"ASSIGNER": "jenkinsci-cert@googlegroups.com"
"ASSIGNER": "jenkinsci-cert@googlegroups.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -53,7 +54,8 @@
"reference_data": [
{
"url": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1098",
"refsource": "CONFIRM"
"refsource": "MISC",
"name": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1098"
}
]
}

View File

@ -1,7 +1,8 @@
{
"CVE_data_meta": {
"ID": "CVE-2019-10360",
"ASSIGNER": "jenkinsci-cert@googlegroups.com"
"ASSIGNER": "jenkinsci-cert@googlegroups.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -53,7 +54,8 @@
"reference_data": [
{
"url": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1184",
"refsource": "CONFIRM"
"refsource": "MISC",
"name": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1184"
}
]
}

View File

@ -1,7 +1,8 @@
{
"CVE_data_meta": {
"ID": "CVE-2019-10361",
"ASSIGNER": "jenkinsci-cert@googlegroups.com"
"ASSIGNER": "jenkinsci-cert@googlegroups.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -53,7 +54,8 @@
"reference_data": [
{
"url": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1435",
"refsource": "CONFIRM"
"refsource": "MISC",
"name": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1435"
}
]
}

View File

@ -1,7 +1,8 @@
{
"CVE_data_meta": {
"ID": "CVE-2019-10362",
"ASSIGNER": "jenkinsci-cert@googlegroups.com"
"ASSIGNER": "jenkinsci-cert@googlegroups.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -53,7 +54,8 @@
"reference_data": [
{
"url": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1446",
"refsource": "CONFIRM"
"refsource": "MISC",
"name": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1446"
}
]
}

View File

@ -1,7 +1,8 @@
{
"CVE_data_meta": {
"ID": "CVE-2019-10363",
"ASSIGNER": "jenkinsci-cert@googlegroups.com"
"ASSIGNER": "jenkinsci-cert@googlegroups.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -53,7 +54,8 @@
"reference_data": [
{
"url": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1458",
"refsource": "CONFIRM"
"refsource": "MISC",
"name": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1458"
}
]
}

View File

@ -1,7 +1,8 @@
{
"CVE_data_meta": {
"ID": "CVE-2019-10364",
"ASSIGNER": "jenkinsci-cert@googlegroups.com"
"ASSIGNER": "jenkinsci-cert@googlegroups.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -53,7 +54,8 @@
"reference_data": [
{
"url": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-673",
"refsource": "CONFIRM"
"refsource": "MISC",
"name": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-673"
}
]
}

View File

@ -1,7 +1,8 @@
{
"CVE_data_meta": {
"ID": "CVE-2019-10365",
"ASSIGNER": "jenkinsci-cert@googlegroups.com"
"ASSIGNER": "jenkinsci-cert@googlegroups.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -53,7 +54,8 @@
"reference_data": [
{
"url": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1345",
"refsource": "CONFIRM"
"refsource": "MISC",
"name": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1345"
}
]
}

View File

@ -1,7 +1,8 @@
{
"CVE_data_meta": {
"ID": "CVE-2019-10366",
"ASSIGNER": "jenkinsci-cert@googlegroups.com"
"ASSIGNER": "jenkinsci-cert@googlegroups.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
@ -53,7 +54,8 @@
"reference_data": [
{
"url": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1429",
"refsource": "CONFIRM"
"refsource": "MISC",
"name": "https://jenkins.io/security/advisory/2019-07-31/#SECURITY-1429"
}
]
}

View File

@ -0,0 +1,67 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-14192",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An issue was discovered in Das U-Boot through 2019.07. There is an unbounded memcpy when parsing a UDP packet due to a net_process_received_packet integer underflow during an nc_input_packet call."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://gitlab.com/u-boot/u-boot",
"refsource": "MISC",
"name": "https://gitlab.com/u-boot/u-boot"
},
{
"refsource": "MISC",
"name": "https://blog.semmle.com/uboot-rce-nfs-vulnerability/",
"url": "https://blog.semmle.com/uboot-rce-nfs-vulnerability/"
}
]
}
}

View File

@ -0,0 +1,67 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-14193",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An issue was discovered in Das U-Boot through 2019.07. There is an unbounded memcpy with an unvalidated length at nfs_readlink_reply, in the \"if\" block after calculating the new path length."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://gitlab.com/u-boot/u-boot",
"refsource": "MISC",
"name": "https://gitlab.com/u-boot/u-boot"
},
{
"refsource": "MISC",
"name": "https://blog.semmle.com/uboot-rce-nfs-vulnerability/",
"url": "https://blog.semmle.com/uboot-rce-nfs-vulnerability/"
}
]
}
}

View File

@ -0,0 +1,67 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-14194",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An issue was discovered in Das U-Boot through 2019.07. There is an unbounded memcpy with a failed length check at nfs_read_reply when calling store_block in the NFSv2 case."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://gitlab.com/u-boot/u-boot",
"refsource": "MISC",
"name": "https://gitlab.com/u-boot/u-boot"
},
{
"refsource": "MISC",
"name": "https://blog.semmle.com/uboot-rce-nfs-vulnerability/",
"url": "https://blog.semmle.com/uboot-rce-nfs-vulnerability/"
}
]
}
}

View File

@ -0,0 +1,67 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-14195",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An issue was discovered in Das U-Boot through 2019.07. There is an unbounded memcpy with unvalidated length at nfs_readlink_reply in the \"else\" block after calculating the new path length."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://gitlab.com/u-boot/u-boot",
"refsource": "MISC",
"name": "https://gitlab.com/u-boot/u-boot"
},
{
"refsource": "MISC",
"name": "https://blog.semmle.com/uboot-rce-nfs-vulnerability/",
"url": "https://blog.semmle.com/uboot-rce-nfs-vulnerability/"
}
]
}
}

View File

@ -0,0 +1,67 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-14196",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An issue was discovered in Das U-Boot through 2019.07. There is an unbounded memcpy with a failed length check at nfs_lookup_reply."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://gitlab.com/u-boot/u-boot",
"refsource": "MISC",
"name": "https://gitlab.com/u-boot/u-boot"
},
{
"refsource": "MISC",
"name": "https://blog.semmle.com/uboot-rce-nfs-vulnerability/",
"url": "https://blog.semmle.com/uboot-rce-nfs-vulnerability/"
}
]
}
}

View File

@ -0,0 +1,67 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-14197",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An issue was discovered in Das U-Boot through 2019.07. There is a read of out-of-bounds data at nfs_read_reply."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://gitlab.com/u-boot/u-boot",
"refsource": "MISC",
"name": "https://gitlab.com/u-boot/u-boot"
},
{
"refsource": "MISC",
"name": "https://blog.semmle.com/uboot-rce-nfs-vulnerability/",
"url": "https://blog.semmle.com/uboot-rce-nfs-vulnerability/"
}
]
}
}

View File

@ -0,0 +1,67 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-14198",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An issue was discovered in Das U-Boot through 2019.07. There is an unbounded memcpy with a failed length check at nfs_read_reply when calling store_block in the NFSv3 case."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://gitlab.com/u-boot/u-boot",
"refsource": "MISC",
"name": "https://gitlab.com/u-boot/u-boot"
},
{
"refsource": "MISC",
"name": "https://blog.semmle.com/uboot-rce-nfs-vulnerability/",
"url": "https://blog.semmle.com/uboot-rce-nfs-vulnerability/"
}
]
}
}

View File

@ -0,0 +1,67 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-14199",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An issue was discovered in Das U-Boot through 2019.07. There is an unbounded memcpy when parsing a UDP packet due to a net_process_received_packet integer underflow during an *udp_packet_handler call."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://gitlab.com/u-boot/u-boot",
"refsource": "MISC",
"name": "https://gitlab.com/u-boot/u-boot"
},
{
"refsource": "MISC",
"name": "https://blog.semmle.com/uboot-rce-nfs-vulnerability/",
"url": "https://blog.semmle.com/uboot-rce-nfs-vulnerability/"
}
]
}
}

View File

@ -0,0 +1,67 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-14200",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An issue was discovered in Das U-Boot through 2019.07. There is a stack-based buffer overflow in this nfs_handler reply helper function: rpc_lookup_reply."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://gitlab.com/u-boot/u-boot",
"refsource": "MISC",
"name": "https://gitlab.com/u-boot/u-boot"
},
{
"refsource": "MISC",
"name": "https://blog.semmle.com/uboot-rce-nfs-vulnerability/",
"url": "https://blog.semmle.com/uboot-rce-nfs-vulnerability/"
}
]
}
}

View File

@ -0,0 +1,67 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-14201",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An issue was discovered in Das U-Boot through 2019.07. There is a stack-based buffer overflow in this nfs_handler reply helper function: nfs_lookup_reply."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://gitlab.com/u-boot/u-boot",
"refsource": "MISC",
"name": "https://gitlab.com/u-boot/u-boot"
},
{
"refsource": "MISC",
"name": "https://blog.semmle.com/uboot-rce-nfs-vulnerability/",
"url": "https://blog.semmle.com/uboot-rce-nfs-vulnerability/"
}
]
}
}

View File

@ -0,0 +1,67 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-14202",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An issue was discovered in Das U-Boot through 2019.07. There is a stack-based buffer overflow in this nfs_handler reply helper function: nfs_readlink_reply."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://gitlab.com/u-boot/u-boot",
"refsource": "MISC",
"name": "https://gitlab.com/u-boot/u-boot"
},
{
"refsource": "MISC",
"name": "https://blog.semmle.com/uboot-rce-nfs-vulnerability/",
"url": "https://blog.semmle.com/uboot-rce-nfs-vulnerability/"
}
]
}
}

View File

@ -0,0 +1,67 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-14203",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An issue was discovered in Das U-Boot through 2019.07. There is a stack-based buffer overflow in this nfs_handler reply helper function: nfs_mount_reply."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://gitlab.com/u-boot/u-boot",
"refsource": "MISC",
"name": "https://gitlab.com/u-boot/u-boot"
},
{
"refsource": "MISC",
"name": "https://blog.semmle.com/uboot-rce-nfs-vulnerability/",
"url": "https://blog.semmle.com/uboot-rce-nfs-vulnerability/"
}
]
}
}

View File

@ -0,0 +1,67 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-14204",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An issue was discovered in Das U-Boot through 2019.07. There is a stack-based buffer overflow in this nfs_handler reply helper function: nfs_umountall_reply."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://gitlab.com/u-boot/u-boot",
"refsource": "MISC",
"name": "https://gitlab.com/u-boot/u-boot"
},
{
"refsource": "MISC",
"name": "https://blog.semmle.com/uboot-rce-nfs-vulnerability/",
"url": "https://blog.semmle.com/uboot-rce-nfs-vulnerability/"
}
]
}
}