Package "u-boot-tools"
  
    
    
        | Name: | 
        u-boot-tools
            
         | 
    
    
         Description: | 
        
             companion tools for Das U-Boot bootloader 
         | 
    
    
        | Latest version: | 
        2020.10+dfsg-1ubuntu0~18.04.3 | 
    
    
        | Release: | 
        bionic (18.04) | 
    
    
        | Level: | 
        security | 
    
    
        | Repository: | 
        main | 
    
         
            | Head package: | 
            u-boot | 
         
        
            | Homepage: | 
            https://www.denx.de/wiki/U-Boot/ | 
        
    
   
  
  
 
Links
    Download "u-boot-tools"
    
Other versions of "u-boot-tools" in Bionic
    
Changelog
    
    
    
        
        
    
    
        | 
               u-boot (2020.10+dfsg-1ubuntu0~18.04.3) bionic-security; urgency=medium 
  * SECURITY UPDATE: unchecked length field in DFU implementation
     - debian/patches/CVE-2022-2347-pre1.patch: handle short frame result of
       UPLOAD in state_dfu_idle in drivers/usb/gadget/f_dfu.c.
     - debian/patches/CVE-2022-2347.patch: fix the unchecked length field in
       drivers/usb/gadget/f_dfu.c.
     - CVE-2022-2347
   * SECURITY UPDATE: buffer overflow via invalid packets
     - debian/patches/CVE-2022-30552_30790.patch: check for the minimum IP
       fragmented datagram size in include/net.h, net/net.c.
     - CVE-2022-30552
     - CVE-2022-30790
   * SECURITY UPDATE: incomplete fix for CVE-2019-14196
     - debian/patches/CVE-2022-30767.patch: switch length to unsigned int in
       net/nfs.c.
     - CVE-2022-30767
   * SECURITY UPDATE: out of bounds write via sqfs_readdir()
     - debian/patches/CVE-2022-33103.patch: prevent arbitrary code execution
       in fs/squashfs/sqfs.c, include/fs.h.
     - CVE-2022-33103
   * SECURITY UPDATE: heap buffer overflow in metadata reading
     - debian/patches/CVE-2022-33967.patch: use kcalloc when relevant in
       fs/squashfs/sqfs.c.
     - CVE-2022-33967
   * SECURITY UPDATE: stack overflow in i2c md command
     - debian/patches/CVE-2022-34835.patch: switch to unsigned int in
       cmd/i2c.c.
     - CVE-2022-34835 
 -- Marc Deslauriers <email address hidden>  Fri, 25 Nov 2022 10:33:01 -0500 
         | 
    
    
        
        
            
            
                
                | CVE-2022-2347 | 
                There exists an unchecked length field in UBoot. The U-Boot DFU implementation does not bound the length field in USB DFU download setup packets, and | 
                 
                
                | CVE-2022-30552 | 
                Das U-Boot 2022.01 has a Buffer Overflow. | 
                 
                
                | CVE-2022-30790 | 
                Das U-Boot 2022.01 has a Buffer Overflow, a different issue than CVE-2022-30552. | 
                 
                
                | CVE-2019-14196 | 
                An issue was discovered in Das U-Boot through 2019.07. There is an unbounded memcpy with a failed length check at nfs_lookup_reply. | 
                 
                
                | CVE-2022-30767 | 
                nfs_lookup_reply in net/nfs.c in Das U-Boot through 2022.04 (and through 2022.07-rc2) has an unbounded memcpy with a failed length check, leading to  | 
                 
                
                | CVE-2022-33103 | 
                Das U-Boot from v2020.10 to v2022.07-rc3 was discovered to contain an out-of-bounds write via the function sqfs_readdir(). | 
                 
                
                | CVE-2022-33967 | 
                squashfs filesystem implementation of U-Boot versions from v2020.10-rc2 to v2022.07-rc5 contains a heap-based buffer overflow vulnerability due to a  | 
                 
                
                | CVE-2022-34835 | 
                In Das U-Boot through 2022.07-rc5, an integer signedness error and resultant stack-based buffer overflow in the "i2c md" command enables the corrupti | 
                 
             
         | 
        
    
    
        
        
        
            About
              -  
            Send Feedback to @ubuntu_updates