There exists an unchecked length field in UBoot. The U-Boot DFU implementation does not bound the length field in USB DFU download setup packets, and it does not verify that the transfer direction corresponds to the specified command. Consequently, if a physical attacker crafts a USB DFU download setup packet with a `wLength` greater than 4096 bytes, they can write beyond the heap-allocated request buffer.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-4150-1 | u-boot security update |
EUVD |
EUVD-2022-34616 | There exists an unchecked length field in UBoot. The U-Boot DFU implementation does not bound the length field in USB DFU download setup packets, and it does not verify that the transfer direction corresponds to the specified command. Consequently, if a physical attacker crafts a USB DFU download setup packet with a `wLength` greater than 4096 bytes, they can write beyond the heap-allocated request buffer. |
Ubuntu USN |
USN-5764-1 | U-Boot vulnerabilities |
Ubuntu USN |
USN-6523-1 | u-boot-nezha vulnerability |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Mon, 03 Nov 2025 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Mon, 21 Apr 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: Google
Published:
Updated: 2025-11-03T19:26:52.354Z
Reserved: 2022-07-08T00:00:00.000Z
Link: CVE-2022-2347
Updated: 2025-11-03T19:26:52.354Z
Status : Modified
Published: 2022-09-23T13:15:10.133
Modified: 2025-11-03T20:15:54.110
Link: CVE-2022-2347
No data.
OpenCVE Enrichment
No data.
Debian DLA
EUVD
Ubuntu USN