[USN-5764-1] U-Boot vulnerabilities
Marc Deslauriers
marc.deslauriers at canonical.com
Tue Dec 6 14:00:26 UTC 2022
==========================================================================
Ubuntu Security Notice USN-5764-1
December 06, 2022
u-boot vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 22.10
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
Summary:
Several security issues were fixed in u-boot.
Software Description:
- u-boot: A boot loader for embedded systems
Details:
It was discovered that U-Boot incorrectly handled certain USB DFU download
setup packets. A local attacker could use this issue to cause U-Boot to
crash, resulting in a denial of service, or possibly execute arbitrary
code. (CVE-2022-2347)
Nicolas Bidron and Nicolas Guigo discovered that U-Boot incorrectly handled
certain fragmented IP packets. A local attacker could use this issue to
cause U-Boot to crash, resulting in a denial of service, or possibly
execute arbitrary code. This issue only affected Ubuntu 18.04 LTS, Ubuntu
20.04 LTS, and Ubuntu 22.04 LTS. (CVE-2022-30552, CVE-2022-30790)
It was discovered that U-Boot incorrectly handled certain NFS lookup
replies. A remote attacker could use this issue to cause U-Boot to crash,
resulting in a denial of service, or possibly execute arbitrary code. This
issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.04
LTS. (CVE-2022-30767)
Jincheng Wang discovered that U-Boot incorrectly handled certain SquashFS
structures. A local attacker could use this issue to cause U-Boot to
crash, resulting in a denial of service, or possibly execute arbitrary
code. This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and
Ubuntu 22.04 LTS. (CVE-2022-33103)
Tatsuhiko Yasumatsu discovered that U-Boot incorrectly handled certain
SquashFS structures. A local attacker could use this issue to cause U-Boot
to crash, resulting in a denial of service, or possibly execute arbitrary
code. This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and
Ubuntu 22.04 LTS. (CVE-2022-33967)
It was discovered that U-Boot incorrectly handled the i2c command. A local
attacker could use this issue to cause U-Boot to crash, resulting in a
denial of service, or possibly execute arbitrary code. This issue only
affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS.
(CVE-2022-34835)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 22.10:
u-boot 2022.07+dfsg-1ubuntu4.2
u-boot-amlogic 2022.07+dfsg-1ubuntu4.2
u-boot-exynos 2022.07+dfsg-1ubuntu4.2
u-boot-imx 2022.07+dfsg-1ubuntu4.2
u-boot-microchip 2022.07+dfsg-1ubuntu4.2
u-boot-mvebu 2022.07+dfsg-1ubuntu4.2
u-boot-omap 2022.07+dfsg-1ubuntu4.2
u-boot-qcom 2022.07+dfsg-1ubuntu4.2
u-boot-qemu 2022.07+dfsg-1ubuntu4.2
u-boot-rockchip 2022.07+dfsg-1ubuntu4.2
u-boot-rpi 2022.07+dfsg-1ubuntu4.2
u-boot-sifive 2022.07+dfsg-1ubuntu4.2
u-boot-stm32 2022.07+dfsg-1ubuntu4.2
u-boot-sunxi 2022.07+dfsg-1ubuntu4.2
u-boot-tegra 2022.07+dfsg-1ubuntu4.2
u-boot-tools 2022.07+dfsg-1ubuntu4.2
Ubuntu 22.04 LTS:
u-boot 2022.01+dfsg-2ubuntu2.3
u-boot-amlogic 2022.01+dfsg-2ubuntu2.3
u-boot-exynos 2022.01+dfsg-2ubuntu2.3
u-boot-imx 2022.01+dfsg-2ubuntu2.3
u-boot-microchip 2022.01+dfsg-2ubuntu2.3
u-boot-mvebu 2022.01+dfsg-2ubuntu2.3
u-boot-omap 2022.01+dfsg-2ubuntu2.3
u-boot-qcom 2022.01+dfsg-2ubuntu2.3
u-boot-qemu 2022.01+dfsg-2ubuntu2.3
u-boot-rockchip 2022.01+dfsg-2ubuntu2.3
u-boot-rpi 2022.01+dfsg-2ubuntu2.3
u-boot-sifive 2022.01+dfsg-2ubuntu2.3
u-boot-sunxi 2022.01+dfsg-2ubuntu2.3
u-boot-tegra 2022.01+dfsg-2ubuntu2.3
u-boot-tools 2022.01+dfsg-2ubuntu2.3
Ubuntu 20.04 LTS:
u-boot 2021.01+dfsg-3ubuntu0~20.04.5
u-boot-amlogic 2021.01+dfsg-3ubuntu0~20.04.5
u-boot-exynos 2021.01+dfsg-3ubuntu0~20.04.5
u-boot-imx 2021.01+dfsg-3ubuntu0~20.04.5
u-boot-mvebu 2021.01+dfsg-3ubuntu0~20.04.5
u-boot-omap 2021.01+dfsg-3ubuntu0~20.04.5
u-boot-qcom 2021.01+dfsg-3ubuntu0~20.04.5
u-boot-qemu 2021.01+dfsg-3ubuntu0~20.04.5
u-boot-rockchip 2021.01+dfsg-3ubuntu0~20.04.5
u-boot-rpi 2021.01+dfsg-3ubuntu0~20.04.5
u-boot-sifive 2021.01+dfsg-3ubuntu0~20.04.5
u-boot-sunxi 2021.01+dfsg-3ubuntu0~20.04.5
u-boot-tegra 2021.01+dfsg-3ubuntu0~20.04.5
u-boot-tools 2021.01+dfsg-3ubuntu0~20.04.5
Ubuntu 18.04 LTS:
u-boot 2020.10+dfsg-1ubuntu0~18.04.3
u-boot-amlogic 2020.10+dfsg-1ubuntu0~18.04.3
u-boot-exynos 2020.10+dfsg-1ubuntu0~18.04.3
u-boot-imx 2020.10+dfsg-1ubuntu0~18.04.3
u-boot-mvebu 2020.10+dfsg-1ubuntu0~18.04.3
u-boot-omap 2020.10+dfsg-1ubuntu0~18.04.3
u-boot-qcom 2020.10+dfsg-1ubuntu0~18.04.3
u-boot-qemu 2020.10+dfsg-1ubuntu0~18.04.3
u-boot-rockchip 2020.10+dfsg-1ubuntu0~18.04.3
u-boot-rpi 2020.10+dfsg-1ubuntu0~18.04.3
u-boot-sunxi 2020.10+dfsg-1ubuntu0~18.04.3
u-boot-tegra 2020.10+dfsg-1ubuntu0~18.04.3
u-boot-tools 2020.10+dfsg-1ubuntu0~18.04.3
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-5764-1
CVE-2022-2347, CVE-2022-30552, CVE-2022-30767, CVE-2022-30790,
CVE-2022-33103, CVE-2022-33967, CVE-2022-34835
Package Information:
https://launchpad.net/ubuntu/+source/u-boot/2022.07+dfsg-1ubuntu4.2
https://launchpad.net/ubuntu/+source/u-boot/2022.01+dfsg-2ubuntu2.3
https://launchpad.net/ubuntu/+source/u-boot/2021.01+dfsg-3ubuntu0~20.04.5
https://launchpad.net/ubuntu/+source/u-boot/2020.10+dfsg-1ubuntu0~18.04.3
-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_signature
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20221206/8333d435/attachment.sig>
More information about the ubuntu-security-announce
mailing list