First published: Thu Jul 07 2022(Updated: )
There exists an unchecked length field in UBoot. The U-Boot DFU implementation does not bound the length field in USB DFU download setup packets, and it does not verify that the transfer direction corresponds to the specified command. Consequently, if a physical attacker crafts a USB DFU download setup packet with a `wLength` greater than 4096 bytes, they can write beyond the heap-allocated request buffer.
Credit: cve-coordination@google.com cve-coordination@google.com
Affected Software | Affected Version | How to fix |
---|---|---|
DENX U-Boot | >=2012.10<=2022.07 | |
ubuntu/u-boot | <2020.10+dfsg-1ubuntu0~18.04.3 | 2020.10+dfsg-1ubuntu0~18.04.3 |
ubuntu/u-boot | <2021.01+dfsg-3ubuntu0~20.04.5 | 2021.01+dfsg-3ubuntu0~20.04.5 |
ubuntu/u-boot | <2022.01+dfsg-2ubuntu2.3 | 2022.01+dfsg-2ubuntu2.3 |
ubuntu/u-boot | <2022.07+dfsg-1ubuntu4.2 | 2022.07+dfsg-1ubuntu4.2 |
ubuntu/u-boot | <2022.07+dfsg-1ubuntu7 | 2022.07+dfsg-1ubuntu7 |
ubuntu/u-boot | <2022.07+dfsg-1ubuntu7 | 2022.07+dfsg-1ubuntu7 |
ubuntu/u-boot-nezha | <2022.04+ | 2022.04+ |
ubuntu/u-boot-nezha | <2022.10-1089- | 2022.10-1089- |
debian/u-boot | <=2019.01+dfsg-7<=2021.01+dfsg-5 | 2023.01+dfsg-2 2024.01+dfsg-1 2024.01+dfsg-5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-2347 is a vulnerability in UBoot that allows a physically attacker to execute arbitrary code or cause a denial of service.
CVE-2022-2347 allows a physically attacker to exploit an unchecked length field in UBoot, leading to arbitrary code execution or denial of service.
CVE-2022-2347 has a severity rating of 7.1 (high).
To mitigate CVE-2022-2347, it is recommended to update UBoot to a version beyond 2022.07 or apply any patches provided by the vendor.
More information about CVE-2022-2347 can be found at the following reference: [seclists.org/oss-sec/2022/q3/41](https://seclists.org/oss-sec/2022/q3/41).