Das U‑Boot contained a dangerous stack‑based buffer overflow in its NFS reply handling code — tracked as CVE‑2019‑14204 — that affects all upstream releases up through 2019.07 and can be triggered when a crafted NFS/UDP response is parsed by the bootloader’s nfs_handler helper...
An overlooked parsing bug in Das U-Boot’s NFS reply handling — tracked as CVE-2019-14195 — allows an attacker who can control the NFS responses seen by a device to trigger an unbounded memcpy and corrupt U-Boot’s stack or heap, creating a realistic pathway to code execution during early boot...
The U‑Boot bootloader contains a critical NFS parsing bug that was assigned CVE‑2019‑14193: an unbounded memcpy in the nfs_readlink_reply handler that uses an attacker‑controlled length without validation, allowing remotely supplied NFS responses to trigger memory corruption and, in the worst...
Microsoft’s one-line MSRC attestation that “Azure Linux includes this open‑source library and is therefore potentially affected” is accurate as a product-level inventory statement — but it is not a technical guarantee that no other Microsoft product can contain the same vulnerable NFS server...