[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DLA 4150-1] u-boot security update



-------------------------------------------------------------------------
Debian LTS Advisory DLA-4150-1                debian-lts@lists.debian.org
https://www.debian.org/lts/security/                       Daniel Leidert
May 01, 2025                                  https://wiki.debian.org/LTS
-------------------------------------------------------------------------

Package        : u-boot
Version        : 2021.01+dfsg-5+deb11u1
CVE ID         : CVE-2019-14196 CVE-2022-2347 CVE-2022-30552 CVE-2022-30767 
                 CVE-2022-30790 CVE-2022-33103 CVE-2022-33967 CVE-2022-34835 
                 CVE-2024-57254 CVE-2024-57255 CVE-2024-57256 CVE-2024-57257 
                 CVE-2024-57258 CVE-2024-57259
Debian Bug     : 1014470 1014471 1014528 1014529 1014959 1098254


Multiple vulnerabilties were discovered in u-boot, a boot loader for
embedded systems.

CVE-2022-2347

   An unchecked length field leading to a heap overflow.

CVE-2022-30552 and CVE-2022-30790

   Buffer Overflow.

CVE-2022-30767 (CVE-2019-14196)

   Unbounded memcpy with a failed length check, leading to a buffer
   overflow. This issue exists due to an incorrect fix for CVE-2019-
   14196.

CVE-2022-33103

   Out-of-bounds write.

CVE-2022-33967

   Heap-based buffer overflow vulnerability which may lead to a denial-
   of-service (DoS). 

CVE-2022-34835

   Integer signedness error and resultant stack-based buffer overflow.

CVE-2024-57254

   Integer overflow.

CVE-2024-57255

   Integer overflow.

CVE-2024-57256

   Integer overflow.

CVE-2024-57257

   Stack consumption issue.

CVE-2024-57258

   Multiple integer overflows.

CVE-2024-57259

   Off-by-one error resulting in heap memory corruption.
   

For Debian 11 bullseye, these problems have been fixed in version
2021.01+dfsg-5+deb11u1.

We recommend that you upgrade your u-boot packages.

For the detailed security status of u-boot please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/u-boot

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

Attachment: signature.asc
Description: This is a digitally signed message part


Reply to: