Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Sat, 16 May 2026 03:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Pengutronix
Pengutronix barebox |
|
| CPEs | cpe:2.3:a:pengutronix:barebox:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Pengutronix
Pengutronix barebox |
Tue, 12 May 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 12 May 2026 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Barebox
Barebox barebox |
|
| Vendors & Products |
Barebox
Barebox barebox |
Mon, 11 May 2026 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | barebox prior to version 2026.04.0 contains an out-of-bounds read vulnerability in DHCP option parsing within the dhcp_message_type() function that fails to verify the options pointer remains within received packet bounds. An attacker on the same broadcast domain can send a crafted DHCP Offer or ACK packet without a proper 0xff end marker to cause the parser to read past valid packet data and potentially crash the system. | |
| Title | barebox Out-of-Bounds Read in DHCP Option Parsing | |
| Weaknesses | CWE-125 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-05-12T14:27:53.205Z
Reserved: 2026-03-31T17:58:43.754Z
Link: CVE-2026-34960
Updated: 2026-05-12T13:21:02.236Z
Status : Analyzed
Published: 2026-05-11T22:22:10.847
Modified: 2026-05-16T03:07:52.297
Link: CVE-2026-34960
No data.
OpenCVE Enrichment
Updated: 2026-05-11T23:45:02Z