Denx U Boot
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in Denx U Boot.
By the Year
In 2026 there have been 0 vulnerabilities in Denx U Boot. Last year, in 2025 U Boot had 7 security vulnerabilities published. Right now, U Boot is on track to have less security vulnerabilities in 2026 than it did last year.
| Year | Vulnerabilities | Average Score |
|---|---|---|
| 2026 | 0 | 0.00 |
| 2025 | 7 | 6.09 |
| 2024 | 1 | 4.10 |
| 2023 | 0 | 0.00 |
| 2022 | 7 | 7.94 |
| 2021 | 2 | 7.80 |
| 2020 | 2 | 7.80 |
| 2019 | 20 | 8.13 |
| 2018 | 3 | 7.70 |
It may take a day or so for new U Boot vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Denx U Boot Security Vulnerabilities
U-Boot append_uint32_le Fault Injection Physical PrivEsc without Interaction
CVE-2025-36938
5.1 - Medium
- December 11, 2025
In U-Boot of append_uint32_le(), there is a possible fault injection due to a logic error in the code. This could lead to physical escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.
Code Injection
U-Boot heap CVE-2024-57259: off-by-1 in sqfs_search_dir ( 2025.01-rc1)
CVE-2024-57259
7.1 - High
- February 18, 2025
sqfs_search_dir in Das U-Boot before 2025.01-rc1 exhibits an off-by-one error and resultant heap memory corruption for squashfs directory listing because the path separator is not considered in a size calculation.
off-by-five
Das U-boot <=2025.01-rc1 Mem Alloc Int Overflow via Squashfs
CVE-2024-57258
7.1 - High
- February 18, 2025
Integer overflows in memory allocation in Das U-Boot before 2025.01-rc1 occur for a crafted squashfs filesystem via sbrk, via request2size, or because ptrdiff_t is mishandled on x86_64.
Integer Overflow or Wraparound
Stack Consumption in Das U-Boot <2025.01-rc1 via Symlink nesting in squashfs
CVE-2024-57257
2 - Low
- February 18, 2025
A stack consumption issue in sqfs_size in Das U-Boot before 2025.01-rc1 occurs via a crafted squashfs filesystem with deep symlink nesting.
Stack Exhaustion
Integer Overflow in Das U-Boot ext4fs_read_symlink (2025.01-rc1)
CVE-2024-57256
7.1 - High
- February 18, 2025
An integer overflow in ext4fs_read_symlink in Das U-Boot before 2025.01-rc1 occurs for zalloc (adding one to an le32 variable) via a crafted ext4 filesystem with an inode size of 0xffffffff, resulting in a malloc of zero and resultant memory overwrite.
Integer Overflow or Wraparound
Integer Overflow in sqfs_resolve_symlink (Das U-Boot <2025.01-rc1)
CVE-2024-57255
7.1 - High
- February 18, 2025
An integer overflow in sqfs_resolve_symlink in Das U-Boot before 2025.01-rc1 occurs via a crafted squashfs filesystem with an inode size of 0xffffffff, resulting in a malloc of zero and resultant memory overwrite.
Integer Overflow or Wraparound
Integer Overflow in U-Boot sqfs_inode_size before 2025.01-rc1
CVE-2024-57254
7.1 - High
- February 18, 2025
An integer overflow in sqfs_inode_size in Das U-Boot before 2025.01-rc1 occurs in the symlink size calculation via a crafted squashfs filesystem.
Integer Overflow or Wraparound
Secure Boot Bypass Vulnerability in U-Boot Firmware
CVE-2024-28922
4.1 - Medium
- April 09, 2024
Secure Boot Security Feature Bypass Vulnerability
U-Boot DFU Length Overflow Vulnerability
CVE-2022-2347
7.1 - High
- September 23, 2022
There exists an unchecked length field in UBoot. The U-Boot DFU implementation does not bound the length field in USB DFU download setup packets, and it does not verify that the transfer direction corresponds to the specified command. Consequently, if a physical attacker crafts a USB DFU download setup packet with a `wLength` greater than 4096 bytes, they can write beyond the heap-allocated request buffer.
Memory Corruption
squashfs filesystem implementation of U-Boot versions
CVE-2022-33967
7.8 - High
- July 20, 2022
squashfs filesystem implementation of U-Boot versions from v2020.10-rc2 to v2022.07-rc5 contains a heap-based buffer overflow vulnerability due to a defect in the metadata reading process. Loading a specially crafted squashfs image may lead to a denial-of-service (DoS) condition or arbitrary code execution.
Memory Corruption
Das U-Boot from v2020.10 to v2022.07-rc3 was discovered to contain an out-of-bounds write
CVE-2022-33103
7.8 - High
- July 01, 2022
Das U-Boot from v2020.10 to v2022.07-rc3 was discovered to contain an out-of-bounds write via the function sqfs_readdir().
Memory Corruption
In Das U-Boot through 2022.07-rc5
CVE-2022-34835
9.8 - Critical
- June 30, 2022
In Das U-Boot through 2022.07-rc5, an integer signedness error and resultant stack-based buffer overflow in the "i2c md" command enables the corruption of the return address pointer of the do_i2c_md function.
Memory Corruption
Das U-Boot 2022.01 has a Buffer Overflow.
CVE-2022-30552
5.5 - Medium
- June 08, 2022
Das U-Boot 2022.01 has a Buffer Overflow.
Classic Buffer Overflow
Das U-Boot 2022.01 has a Buffer Overflow
CVE-2022-30790
7.8 - High
- June 08, 2022
Das U-Boot 2022.01 has a Buffer Overflow, a different issue than CVE-2022-30552.
Memory Corruption
nfs_lookup_reply in net/nfs.c in Das U-Boot through 2022.04 (and through 2022.07-rc2) has an unbounded memcpy with a failed length check
CVE-2022-30767
9.8 - Critical
- May 16, 2022
nfs_lookup_reply in net/nfs.c in Das U-Boot through 2022.04 (and through 2022.07-rc2) has an unbounded memcpy with a failed length check, leading to a buffer overflow. NOTE: this issue exists because of an incorrect fix for CVE-2019-14196.
Classic Buffer Overflow
The boot loader in Das U-Boot before 2021.04-rc2 mishandles use of unit addresses in a FIT.
CVE-2021-27138
7.8 - High
- February 17, 2021
The boot loader in Das U-Boot before 2021.04-rc2 mishandles use of unit addresses in a FIT.
The boot loader in Das U-Boot before 2021.04-rc2 mishandles a modified FIT.
CVE-2021-27097
7.8 - High
- February 17, 2021
The boot loader in Das U-Boot before 2021.04-rc2 mishandles a modified FIT.
Das U-Boot through 2020.01
CVE-2020-10648
7.8 - High
- March 19, 2020
Das U-Boot through 2020.01 allows attackers to bypass verified boot restrictions and subsequently boot arbitrary images by providing a crafted FIT image to a system configured to boot the default configuration.
Improper Input Validation
In Das U-Boot through 2020.01, a double free has been found in the cmd/gpt.c do_rename_gpt_parts() function
CVE-2020-8432
- January 29, 2020
In Das U-Boot through 2020.01, a double free has been found in the cmd/gpt.c do_rename_gpt_parts() function. Double freeing may result in a write-what-where condition, allowing an attacker to execute arbitrary code. NOTE: this vulnerablity was introduced when attempting to fix a memory leak identified by static analysis.
Das U-Boot versions 2019.07-rc1 through 2019.07-rc4
CVE-2019-13105
- August 06, 2019
Das U-Boot versions 2019.07-rc1 through 2019.07-rc4 can double-free a cached block of data when listing files in a crafted ext4 filesystem.
Das U-Boot versions 2016.09 through 2019.07-rc4 can memset() too much data while reading a crafted ext4 filesystem
CVE-2019-13106
- August 06, 2019
Das U-Boot versions 2016.09 through 2019.07-rc4 can memset() too much data while reading a crafted ext4 filesystem, which results in a stack buffer overflow and likely code execution.
In Das U-Boot versions 2016.11-rc1 through 2019.07-rc4, an underflow
CVE-2019-13104
- August 06, 2019
In Das U-Boot versions 2016.11-rc1 through 2019.07-rc4, an underflow can cause memcpy() to overwrite a very large amount of data (including the whole stack) while reading a crafted ext4 filesystem.
An issue was discovered in Das U-Boot through 2019.07
CVE-2019-14203
- July 31, 2019
An issue was discovered in Das U-Boot through 2019.07. There is a stack-based buffer overflow in this nfs_handler reply helper function: nfs_mount_reply.
An issue was discovered in Das U-Boot through 2019.07
CVE-2019-14192
- July 31, 2019
An issue was discovered in Das U-Boot through 2019.07. There is an unbounded memcpy when parsing a UDP packet due to a net_process_received_packet integer underflow during an nc_input_packet call.
An issue was discovered in Das U-Boot through 2019.07
CVE-2019-14193
- July 31, 2019
An issue was discovered in Das U-Boot through 2019.07. There is an unbounded memcpy with an unvalidated length at nfs_readlink_reply, in the "if" block after calculating the new path length.
An issue was discovered in Das U-Boot through 2019.07
CVE-2019-14194
- July 31, 2019
An issue was discovered in Das U-Boot through 2019.07. There is an unbounded memcpy with a failed length check at nfs_read_reply when calling store_block in the NFSv2 case.
An issue was discovered in Das U-Boot through 2019.07
CVE-2019-14195
- July 31, 2019
An issue was discovered in Das U-Boot through 2019.07. There is an unbounded memcpy with unvalidated length at nfs_readlink_reply in the "else" block after calculating the new path length.
An issue was discovered in Das U-Boot through 2019.07
CVE-2019-14196
9.8 - Critical
- July 31, 2019
An issue was discovered in Das U-Boot through 2019.07. There is an unbounded memcpy with a failed length check at nfs_lookup_reply.
Memory Corruption
An issue was discovered in Das U-Boot through 2019.07
CVE-2019-14197
- July 31, 2019
An issue was discovered in Das U-Boot through 2019.07. There is a read of out-of-bounds data at nfs_read_reply.
An issue was discovered in Das U-Boot through 2019.07
CVE-2019-14198
- July 31, 2019
An issue was discovered in Das U-Boot through 2019.07. There is an unbounded memcpy with a failed length check at nfs_read_reply when calling store_block in the NFSv3 case.
An issue was discovered in Das U-Boot through 2019.07
CVE-2019-14199
- July 31, 2019
An issue was discovered in Das U-Boot through 2019.07. There is an unbounded memcpy when parsing a UDP packet due to a net_process_received_packet integer underflow during an *udp_packet_handler call.
An issue was discovered in Das U-Boot through 2019.07
CVE-2019-14200
- July 31, 2019
An issue was discovered in Das U-Boot through 2019.07. There is a stack-based buffer overflow in this nfs_handler reply helper function: rpc_lookup_reply.
An issue was discovered in Das U-Boot through 2019.07
CVE-2019-14201
- July 31, 2019
An issue was discovered in Das U-Boot through 2019.07. There is a stack-based buffer overflow in this nfs_handler reply helper function: nfs_lookup_reply.
An issue was discovered in Das U-Boot through 2019.07
CVE-2019-14204
- July 31, 2019
An issue was discovered in Das U-Boot through 2019.07. There is a stack-based buffer overflow in this nfs_handler reply helper function: nfs_umountall_reply.
An issue was discovered in Das U-Boot through 2019.07
CVE-2019-14202
- July 31, 2019
An issue was discovered in Das U-Boot through 2019.07. There is a stack-based buffer overflow in this nfs_handler reply helper function: nfs_readlink_reply.
A crafted self-referential DOS partition table will cause all Das U-Boot versions through 2019.07-rc4 to infinitely recurse
CVE-2019-13103
- July 29, 2019
A crafted self-referential DOS partition table will cause all Das U-Boot versions through 2019.07-rc4 to infinitely recurse, causing the stack to grow infinitely and eventually either crash or overwrite other data.
Das U-Boot 2016.11-rc1 through 2019.04 mishandles the ext4 64-bit extension
CVE-2019-11059
9.8 - Critical
- May 10, 2019
Das U-Boot 2016.11-rc1 through 2019.04 mishandles the ext4 64-bit extension, resulting in a buffer overflow.
Buffer Overflow
gen_rand_uuid in lib/uuid.c in Das U-Boot v2014.04 through v2019.04 lacks an srand call, which
CVE-2019-11690
5.9 - Medium
- May 03, 2019
gen_rand_uuid in lib/uuid.c in Das U-Boot v2014.04 through v2019.04 lacks an srand call, which allows attackers to determine UUID values in scenarios where CONFIG_RANDOM_UUID is enabled, and Das U-Boot is relied upon for UUID values of a GUID Partition Table of a boot device.
Use of Insufficiently Random Values
An exploitable vulnerability exists in the verified boot protection of the Das U-Boot from version 2013.07-rc1 to 2014.07-rc2
CVE-2018-3968
7 - High
- March 21, 2019
An exploitable vulnerability exists in the verified boot protection of the Das U-Boot from version 2013.07-rc1 to 2014.07-rc2. The affected versions lack proper FIT signature enforcement, which allows an attacker to bypass U-Boot's verified boot and execute an unsigned kernel, embedded in a legacy image format. To trigger this vulnerability, a local attacker needs to be able to supply the image to boot.
Improper Verification of Cryptographic Signature
DENX U-Boot through 2018.09-rc1 has a remotely exploitable buffer overflow via a malicious TFTP server because TFTP traffic is mishandled
CVE-2018-18439
9.8 - Critical
- November 20, 2018
DENX U-Boot through 2018.09-rc1 has a remotely exploitable buffer overflow via a malicious TFTP server because TFTP traffic is mishandled. Also, local exploitation can occur via a crafted kernel image.
Buffer Overflow
DENX U-Boot through 2018.09-rc1 has a locally exploitable buffer overflow via a crafted kernel image
CVE-2018-18440
7.8 - High
- November 20, 2018
DENX U-Boot through 2018.09-rc1 has a locally exploitable buffer overflow via a crafted kernel image because filesystem loading is mishandled.
Buffer Overflow
U-Boot contains a CWE-20: Improper Input Validation vulnerability in Verified boot signature validation
CVE-2018-1000205
5.5 - Medium
- June 26, 2018
U-Boot contains a CWE-20: Improper Input Validation vulnerability in Verified boot signature validation that can result in Bypass verified boot. This attack appear to be exploitable via Specially crafted FIT image and special device memory functionality.
Improper Input Validation
Stay on top of Security Vulnerabilities
Want an email whenever new vulnerabilities are published for Denx U Boot or by Denx? Click the Watch button to subscribe.