Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!Close

CVE-2022-2347

Published: 23 September 2022

There exists an unchecked length field in UBoot. The U-Boot DFU implementation does not bound the length field in USB DFU download setup packets, and it does not verify that the transfer direction corresponds to the specified command. Consequently, if a physical attacker crafts a USB DFU download setup packet with a `wLength` greater than 4096 bytes, they can write beyond the heap-allocated request buffer.

Priority

Medium

Cvss 3 Severity Score

7.1

Score breakdown

Status

Package Release Status
u-boot
Launchpad, Ubuntu, Debian
upstream Needs triage

jammy
Released (2022.01+dfsg-2ubuntu2.3)
kinetic
Released (2022.07+dfsg-1ubuntu4.2)
trusty Does not exist

xenial Needs triage

impish Ignored
(end of life)
bionic
Released (2020.10+dfsg-1ubuntu0~18.04.3)
focal
Released (2021.01+dfsg-3ubuntu0~20.04.5)
lunar
Released (2022.07+dfsg-1ubuntu7)
mantic
Released (2022.07+dfsg-1ubuntu7)
Patches:
upstream: https://github.com/u-boot/u-boot/commit/fbce985e28eaca3af82afecc11961aadaf971a7e
u-boot-nezha
Launchpad, Ubuntu, Debian
trusty Ignored
(end of standard support)
xenial Ignored
(end of standard support)
bionic Does not exist

focal Does not exist

jammy
Released (2022.04+git20220405.7446a472-0ubuntu0.4)
kinetic Ignored
(end of life, was needed)
lunar
Released (2022.10-1089-g528ae9bc6c-0ubuntu1.23.04.2)
mantic Needed

upstream Needs triage

Severity score breakdown

Parameter Value
Base score 7.1
Attack vector Physical
Attack complexity High
Privileges required None
User interaction None
Scope Changed
Confidentiality High
Integrity impact High
Availability impact High
Vector CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H