CVE-2022-34835

In Das U-Boot through 2022.07-rc5, an integer signedness error and resultant stack-based buffer overflow in the "i2c md" command enables the corruption of the return address pointer of the do_i2c_md function.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:denx:u-boot:*:*:*:*:*:*:*:*
cpe:2.3:a:denx:u-boot:2022.07:rc1:*:*:*:*:*:*
cpe:2.3:a:denx:u-boot:2022.07:rc2:*:*:*:*:*:*
cpe:2.3:a:denx:u-boot:2022.07:rc3:*:*:*:*:*:*
cpe:2.3:a:denx:u-boot:2022.07:rc4:*:*:*:*:*:*
cpe:2.3:a:denx:u-boot:2022.07:rc5:*:*:*:*:*:*

History

21 Nov 2024, 07:10

Type Values Removed Values Added
References () https://github.com/u-boot/u-boot/commit/8f8c04bf1ebbd2f72f1643e7ad9617dafa6e5409 - Exploit, Patch, Third Party Advisory () https://github.com/u-boot/u-boot/commit/8f8c04bf1ebbd2f72f1643e7ad9617dafa6e5409 - Exploit, Patch, Third Party Advisory
References () https://lists.denx.de/pipermail/u-boot/2022-June/486113.html - Exploit, Patch, Vendor Advisory () https://lists.denx.de/pipermail/u-boot/2022-June/486113.html - Exploit, Patch, Vendor Advisory
References () https://source.denx.de/u-boot/u-boot/-/commit/8f8c04bf1ebbd2f72f1643e7ad9617dafa6e5409 - Patch, Vendor Advisory () https://source.denx.de/u-boot/u-boot/-/commit/8f8c04bf1ebbd2f72f1643e7ad9617dafa6e5409 - Patch, Vendor Advisory

Information

Published : 2022-06-30 00:15

Updated : 2024-11-21 07:10


NVD link : CVE-2022-34835

Mitre link : CVE-2022-34835

CVE.ORG link : CVE-2022-34835


JSON object : View

Products Affected

denx

  • u-boot
CWE
CWE-787

Out-of-bounds Write