PatchSiren cyber security CVE debrief
CVE-2019-13106 Denx CVE debrief
CVE-2019-13106 is a high-severity flaw in U-Boot’s ext4 filesystem handling. A crafted ext4 image can cause memset() to write too much data during parsing, leading to a stack buffer overflow. Because U-Boot runs early in the boot chain, successful exploitation can have serious integrity and availability impact, and the NVD record rates confidentiality, integrity, and availability as high.
- Vendor
- Denx
- Product
- CVE-2019-13106
- CVSS
- HIGH 7.8
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2019-08-06
- Original CVE updated
- 2026-05-12
- Advisory published
- 2019-08-06
- Advisory updated
- 2026-05-12
Who should care
Embedded and IoT device vendors, firmware engineers, bootloader maintainers, and distro or platform teams that ship U-Boot-based systems should pay attention. Teams that boot from removable media, network-delivered images, or other untrusted storage are especially relevant.
Technical summary
The issue is a memory-safety bug in U-Boot’s ext4 reader. When processing a specially crafted ext4 filesystem, memset() can clear beyond the intended stack buffer boundary, producing a stack-based buffer overflow. The published description indicates likely code execution, and NVD maps the weakness to CWE-787.
Defensive priority
High. The attack vector is local and requires user interaction, but the affected component is a bootloader, so compromise can occur very early in system startup and may have outsized security impact.
Recommended defensive actions
- Inventory all products and images that use U-Boot and check the exact version in use.
- Upgrade to a non-vulnerable U-Boot release using vendor or upstream guidance.
- Review firmware update and boot media workflows for exposure to untrusted ext4 images.
- Prioritize systems that parse removable, externally supplied, or network-fetched boot media.
- Use trusted, controlled boot assets and validate vendor advisories before deployment.
- Track downstream advisories for platform-specific backports and fix status.
Evidence notes
The debrief is based on the supplied NVD record and linked references. The CVE description states that U-Boot versions 2016.09 through 2019.07-rc4 can overflow a stack buffer while reading a crafted ext4 filesystem. The NVD CPE criteria also mark U-Boot 2019.07 and 2019.07-rc1 through rc4 as vulnerable, so the exact affected range should be checked against the specific build or backport status. References include an upstream U-Boot mailing list patch and downstream advisories from openSUSE and Siemens.
Official resources
-
CVE-2019-13106 CVE record
CVE.org
-
CVE-2019-13106 NVD detail
NVD
-
Source item URL
nvd_modified
-
Mitigation or vendor reference
[email protected] - Mailing List, Third Party Advisory
-
Mitigation or vendor reference
[email protected] - Mailing List, Third Party Advisory
-
Mitigation or vendor reference
[email protected] - Third Party Advisory
-
Source reference
[email protected] - Product
-
Mitigation or vendor reference
[email protected] - Mailing List, Patch
-
Source reference
0b142b55-0307-4c5a-b3c9-f314f3fb7c5e
Publicly disclosed on 2019-08-06; the supplied NVD record was last modified on 2026-05-12.