Package | u-boot |
---|---|
Version | 2016.11+dfsg1-4+deb9u1 (stretch), 2019.01+dfsg-7+deb10u1 (buster) |
Related CVEs | CVE-2019-13103 CVE-2019-13104 CVE-2019-13106 CVE-2019-14192 CVE-2019-14193 CVE-2019-14194 CVE-2019-14195 CVE-2019-14196 CVE-2019-14197 CVE-2019-14198 CVE-2019-14199 CVE-2019-14200 CVE-2019-14201 CVE-2019-14202 CVE-2019-14203 CVE-2019-14204 CVE-2020-8432 CVE-2020-10648 CVE-2022-2347 CVE-2022-30552 CVE-2022-30790 CVE-2022-34835 CVE-2024-57256 CVE-2024-57258 |
Multiple vulnerabilities have been discovered in u-boot, a boot loader for embedded systems.
CVE-2019-13103
A crafted self-referential DOS partition table will cause all Das U-Boot
versions through 2019.07-rc4 to infinitely recurse, causing the stack to grow
infinitely and eventually either crash or overwrite other data.
CVE-2019-13104
In Das U-Boot versions 2016.11-rc1 through 2019.07-rc4, an underflow can cause
memcpy() to overwrite a very large amount of data (including the whole stack)
while reading a crafted ext4 filesystem.
CVE-2019-13106
Das U-Boot versions 2016.09 through 2019.07-rc4 can memset() too much data
while reading a crafted ext4 filesystem, which results in a stack buffer
overflow and likely code execution.
CVE-2019-14192
An issue was discovered in Das U-Boot through 2019.07. There is an unbounded
memcpy when parsing a UDP packet due to a net_process_received_packet integer
underflow during an nc_input_packet call.
CVE-2019-14193
An issue was discovered in Das U-Boot through 2019.07. There is an unbounded
memcpy with an unvalidated length at nfs_readlink_reply, in the "if" block
after calculating the new path length.
CVE-2019-14194
An issue was discovered in Das U-Boot through 2019.07. There is an unbounded
memcpy with a failed length check at nfs_read_reply when calling store_block in
the NFSv2 case.
CVE-2019-14195
An issue was discovered in Das U-Boot through 2019.07. There is an unbounded
memcpy with unvalidated length at nfs_readlink_reply in the "else" block after
calculating the new path length.
CVE-2019-14196
An issue was discovered in Das U-Boot through 2019.07. There is an unbounded
memcpy with a failed length check at nfs_lookup_reply.
CVE-2019-14197
An issue was discovered in Das U-Boot through 2019.07. There is a read of
out-of-bounds data at nfs_read_reply.
CVE-2019-14198
An issue was discovered in Das U-Boot through 2019.07. There is an unbounded
memcpy with a failed length check at nfs_read_reply when calling store_block in
the NFSv3 case.
CVE-2019-14199
An issue was discovered in Das U-Boot through 2019.07. There is an unbounded
memcpy when parsing a UDP packet due to a net_process_received_packet integer
underflow during an *udp_packet_handler call.
CVE-2019-14200
An issue was discovered in Das U-Boot through 2019.07. There is a stack-based
buffer overflow in this nfs_handler reply helper function: rpc_lookup_reply.
CVE-2019-14201
An issue was discovered in Das U-Boot through 2019.07. There is a stack-based
buffer overflow in this nfs_handler reply helper function: nfs_lookup_reply.
CVE-2019-14202
An issue was discovered in Das U-Boot through 2019.07. There is a stack-based
buffer overflow in this nfs_handler reply helper function: nfs_readlink_reply.
CVE-2019-14203
An issue was discovered in Das U-Boot through 2019.07. There is a stack-based
buffer overflow in this nfs_handler reply helper function: nfs_mount_reply.
CVE-2019-14204
An issue was discovered in Das U-Boot through 2019.07. There is a stack-based
buffer overflow in this nfs_handler reply helper function: nfs_umountall_reply.
CVE-2020-8432
In Das U-Boot through 2020.01, a double free has been found in the cmd/gpt.c
do_rename_gpt_parts() function. Double freeing may result in a write-what-where
condition, allowing an attacker to execute arbitrary code.
CVE-2020-10648
Das U-Boot through 2020.01 allows attackers to bypass verified boot
restrictions and subsequently boot arbitrary images by providing a crafted FIT
image to a system configured to boot the default configuration.
CVE-2022-2347
There exists an unchecked length field in UBoot. The U-Boot DFU implementation
does not bound the length field in USB DFU download setup packets, and it does
not verify that the transfer direction corresponds to the specified command.
Consequently, if a physical attacker crafts a USB DFU download setup packet
with a `wLength` greater than 4096 bytes, they can write beyond the
heap-allocated request buffer.
CVE-2022-30552
Das U-Boot 2022.01 has a Buffer Overflow.
CVE-2022-30790
Das U-Boot 2022.01 has a Buffer Overflow, a different issue than
CVE-2022-30552.
CVE-2022-34835
In Das U-Boot through 2022.07-rc5, an integer signedness error and resultant
stack-based buffer overflow in the "i2c md" command enables the corruption of
the return address pointer of the do_i2c_md function.
CVE-2024-57256
An integer overflow in ext4fs_read_symlink in Das U-Boot before 2025.01-rc1
occurs for zalloc (adding one to an le32 variable) via a crafted ext4
filesystem with an inode size of 0xffffffff, resulting in a malloc of zero and
resultant memory overwrite.
CVE-2024-57258
Integer overflows in memory allocation in Das U-Boot before 2025.01-rc1 occur
for a crafted squashfs filesystem via sbrk, via request2size, or because
ptrdiff_t is mishandled on x86_64.
For Debian 10 buster, these problems have been fixed in version 2019.01+dfsg-7+deb10u1.
For Debian 9 stretch, these problems have been fixed in version 2016.11+dfsg1-4+deb9u1.
We recommend that you upgrade your u-boot packages.
Further information about Extended LTS security advisories can be found in the dedicated section of our website.