PatchSiren cyber security CVE debrief
CVE-2019-13103 Denx CVE debrief
CVE-2019-13103 is a high-severity bootloader flaw in Denx U-Boot. According to the supplied NVD record, a crafted self-referential DOS partition table can trigger infinite recursion in the parser, causing the stack to grow until the system crashes or overwrites other data. NVD lists affected U-Boot versions through 2019.07-rc4, and the weakness is categorized as CWE-674 (Uncontrolled Recursion).
- Vendor
- Denx
- Product
- CVE-2019-13103
- CVSS
- HIGH 7.1
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2019-07-29
- Original CVE updated
- 2026-05-12
- Advisory published
- 2019-07-29
- Advisory updated
- 2026-05-12
Who should care
Embedded device vendors, OEM firmware teams, and security engineers responsible for U-Boot-based boot chains should prioritize this issue, especially where the bootloader may parse partition tables from untrusted or externally supplied storage.
Technical summary
The supplied NVD data describes a CWE-674 uncontrolled recursion issue in Denx U-Boot. A crafted self-referential DOS partition table can cause the parser to recurse indefinitely during boot-time processing, leading to stack exhaustion and potential memory corruption. The affected scope in the corpus includes U-Boot versions through 2019.07-rc4, including the 2019.04 release line and the 2019.07 release candidates rc1 through rc4. The CVSS vector provided by NVD is CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H.
Defensive priority
High for any fleet using affected U-Boot builds. Prioritize systems that boot from media or images whose partition tables may not be fully trusted, because the impact is boot failure and possible data corruption in a privileged early-boot component.
Recommended defensive actions
- Inventory all products and firmware images that embed U-Boot, and confirm whether they use versions in the affected range listed by NVD.
- Apply the vendor/U-Boot patch referenced in the mailing list and commit-history links, and move affected deployments to a non-vulnerable release.
- Treat DOS partition-table parsing as untrusted input; add or verify recursion-depth limits and cycle detection in any downstream forks or board-specific modifications.
- Test boot paths in staging with malformed partition-table handling to confirm the device fails safely instead of recursing indefinitely.
- Monitor for boot failures, watchdog resets, or unexpected early-boot crashes on devices that may encounter crafted storage media or images.
- Use the Siemens advisories and U-Boot mailing-list discussion as remediation references when coordinating fixes across vendors and downstream integrators.
Evidence notes
The supplied corpus shows CVE publication on 2019-07-29 and later record modification on 2026-05-12; the modification date is NVD record maintenance, not the vulnerability issue date. NVD identifies the weakness as CWE-674 and provides the CVSS 3.1 vector AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H. The affected CPE criteria in the corpus cover U-Boot through 2019.07-rc4. Patch/advisory references include Siemens advisories, the U-Boot mailing-list thread, and U-Boot commit history.
Official resources
-
CVE-2019-13103 CVE record
CVE.org
-
CVE-2019-13103 NVD detail
NVD
-
Source item URL
nvd_modified
-
Mitigation or vendor reference
[email protected] - Third Party Advisory
-
Mitigation or vendor reference
[email protected] - Third Party Advisory
-
Mitigation or vendor reference
[email protected] - Patch, Third Party Advisory
-
Mitigation or vendor reference
[email protected] - Patch, Third Party Advisory
-
Source reference
0b142b55-0307-4c5a-b3c9-f314f3fb7c5e
-
Source reference
0b142b55-0307-4c5a-b3c9-f314f3fb7c5e
Publicly disclosed on 2019-07-29. The NVD record was later modified on 2026-05-12; that date reflects record updates, not original disclosure.