There exists an unchecked length field in UBoot. The U-Boot DFU implementation does not bound the length field in USB DFU download setup packets, and it does not verify that the transfer direction corresponds to the specified command. Consequently, if a physical attacker crafts a USB DFU download setup packet with a `wLength` greater than 4096 bytes, they can write beyond the heap-allocated request buffer.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
DLA-4150-1 | u-boot security update |
![]() |
EUVD-2022-34616 | There exists an unchecked length field in UBoot. The U-Boot DFU implementation does not bound the length field in USB DFU download setup packets, and it does not verify that the transfer direction corresponds to the specified command. Consequently, if a physical attacker crafts a USB DFU download setup packet with a `wLength` greater than 4096 bytes, they can write beyond the heap-allocated request buffer. |
![]() |
USN-5764-1 | U-Boot vulnerabilities |
![]() |
USN-6523-1 | u-boot-nezha vulnerability |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
Link | Providers |
---|---|
https://seclists.org/oss-sec/2022/q3/41 |
![]() ![]() |
History
Mon, 21 Apr 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: Google
Published:
Updated: 2025-04-21T13:48:54.147Z
Reserved: 2022-07-08T00:00:00.000Z
Link: CVE-2022-2347

Updated: 2024-08-03T00:32:09.679Z

Status : Modified
Published: 2022-09-23T13:15:10.133
Modified: 2024-11-21T07:00:49.073
Link: CVE-2022-2347

No data.

No data.