Name | CVE-2022-34835 |
Description | In Das U-Boot through 2022.07-rc5, an integer signedness error and resultant stack-based buffer overflow in the "i2c md" command enables the corruption of the return address pointer of the do_i2c_md function. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Debian Bugs | 1014529 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
u-boot (PTS) | jessie | 2014.10+dfsg1-5 | vulnerable |
| stretch | 2016.11+dfsg1-4 | vulnerable |
| buster | 2019.01+dfsg-7 | vulnerable |
| bullseye | 2021.01+dfsg-5 | vulnerable |
| bookworm | 2023.01+dfsg-2+deb12u1 | fixed |
| sid, trixie | 2024.01+dfsg-5 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|
u-boot | source | jessie | (unfixed) | end-of-life | | |
u-boot | source | (unstable) | 2022.07+dfsg-1 | | | 1014529 |
Notes
[bullseye] - u-boot <no-dsa> (Minor issue)
[buster] - u-boot <no-dsa> (Minor issue)
https://lists.denx.de/pipermail/u-boot/2022-June/486113.html
https://source.denx.de/u-boot/u-boot/-/commit/8f8c04bf1ebbd2f72f1643e7ad9617dafa6e5409 (v2022.07-rc6)
[stretch] - u-boot <no-dsa> (Minor issue)