[USN-5764-1] U-Boot vulnerabilities

Marc Deslauriers marc.deslauriers at canonical.com
Tue Dec 6 14:00:26 UTC 2022


==========================================================================
Ubuntu Security Notice USN-5764-1
December 06, 2022

u-boot vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 22.10
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS

Summary:

Several security issues were fixed in u-boot.

Software Description:
- u-boot: A boot loader for embedded systems

Details:

It was discovered that U-Boot incorrectly handled certain USB DFU download
setup packets. A local attacker could use this issue to cause U-Boot to
crash, resulting in a denial of service, or possibly execute arbitrary
code. (CVE-2022-2347)

Nicolas Bidron and Nicolas Guigo discovered that U-Boot incorrectly handled
certain fragmented IP packets. A local attacker could use this issue to
cause U-Boot to crash, resulting in a denial of service, or possibly
execute arbitrary code. This issue only affected Ubuntu 18.04 LTS, Ubuntu
20.04 LTS, and Ubuntu 22.04 LTS. (CVE-2022-30552, CVE-2022-30790)

It was discovered that U-Boot incorrectly handled certain NFS lookup
replies. A remote attacker could use this issue to cause U-Boot to crash,
resulting in a denial of service, or possibly execute arbitrary code. This
issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.04
LTS. (CVE-2022-30767)

Jincheng Wang discovered that U-Boot incorrectly handled certain SquashFS
structures. A local attacker could use this issue to cause U-Boot to
crash, resulting in a denial of service, or possibly execute arbitrary
code. This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and
Ubuntu 22.04 LTS. (CVE-2022-33103)

Tatsuhiko Yasumatsu discovered that U-Boot incorrectly handled certain
SquashFS structures. A local attacker could use this issue to cause U-Boot
to crash, resulting in a denial of service, or possibly execute arbitrary
code. This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and
Ubuntu 22.04 LTS. (CVE-2022-33967)

It was discovered that U-Boot incorrectly handled the i2c command. A local
attacker could use this issue to cause U-Boot to crash, resulting in a
denial of service, or possibly execute arbitrary code. This issue only
affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS.
(CVE-2022-34835)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 22.10:
   u-boot                          2022.07+dfsg-1ubuntu4.2
   u-boot-amlogic                  2022.07+dfsg-1ubuntu4.2
   u-boot-exynos                   2022.07+dfsg-1ubuntu4.2
   u-boot-imx                      2022.07+dfsg-1ubuntu4.2
   u-boot-microchip                2022.07+dfsg-1ubuntu4.2
   u-boot-mvebu                    2022.07+dfsg-1ubuntu4.2
   u-boot-omap                     2022.07+dfsg-1ubuntu4.2
   u-boot-qcom                     2022.07+dfsg-1ubuntu4.2
   u-boot-qemu                     2022.07+dfsg-1ubuntu4.2
   u-boot-rockchip                 2022.07+dfsg-1ubuntu4.2
   u-boot-rpi                      2022.07+dfsg-1ubuntu4.2
   u-boot-sifive                   2022.07+dfsg-1ubuntu4.2
   u-boot-stm32                    2022.07+dfsg-1ubuntu4.2
   u-boot-sunxi                    2022.07+dfsg-1ubuntu4.2
   u-boot-tegra                    2022.07+dfsg-1ubuntu4.2
   u-boot-tools                    2022.07+dfsg-1ubuntu4.2

Ubuntu 22.04 LTS:
   u-boot                          2022.01+dfsg-2ubuntu2.3
   u-boot-amlogic                  2022.01+dfsg-2ubuntu2.3
   u-boot-exynos                   2022.01+dfsg-2ubuntu2.3
   u-boot-imx                      2022.01+dfsg-2ubuntu2.3
   u-boot-microchip                2022.01+dfsg-2ubuntu2.3
   u-boot-mvebu                    2022.01+dfsg-2ubuntu2.3
   u-boot-omap                     2022.01+dfsg-2ubuntu2.3
   u-boot-qcom                     2022.01+dfsg-2ubuntu2.3
   u-boot-qemu                     2022.01+dfsg-2ubuntu2.3
   u-boot-rockchip                 2022.01+dfsg-2ubuntu2.3
   u-boot-rpi                      2022.01+dfsg-2ubuntu2.3
   u-boot-sifive                   2022.01+dfsg-2ubuntu2.3
   u-boot-sunxi                    2022.01+dfsg-2ubuntu2.3
   u-boot-tegra                    2022.01+dfsg-2ubuntu2.3
   u-boot-tools                    2022.01+dfsg-2ubuntu2.3

Ubuntu 20.04 LTS:
   u-boot                          2021.01+dfsg-3ubuntu0~20.04.5
   u-boot-amlogic                  2021.01+dfsg-3ubuntu0~20.04.5
   u-boot-exynos                   2021.01+dfsg-3ubuntu0~20.04.5
   u-boot-imx                      2021.01+dfsg-3ubuntu0~20.04.5
   u-boot-mvebu                    2021.01+dfsg-3ubuntu0~20.04.5
   u-boot-omap                     2021.01+dfsg-3ubuntu0~20.04.5
   u-boot-qcom                     2021.01+dfsg-3ubuntu0~20.04.5
   u-boot-qemu                     2021.01+dfsg-3ubuntu0~20.04.5
   u-boot-rockchip                 2021.01+dfsg-3ubuntu0~20.04.5
   u-boot-rpi                      2021.01+dfsg-3ubuntu0~20.04.5
   u-boot-sifive                   2021.01+dfsg-3ubuntu0~20.04.5
   u-boot-sunxi                    2021.01+dfsg-3ubuntu0~20.04.5
   u-boot-tegra                    2021.01+dfsg-3ubuntu0~20.04.5
   u-boot-tools                    2021.01+dfsg-3ubuntu0~20.04.5

Ubuntu 18.04 LTS:
   u-boot                          2020.10+dfsg-1ubuntu0~18.04.3
   u-boot-amlogic                  2020.10+dfsg-1ubuntu0~18.04.3
   u-boot-exynos                   2020.10+dfsg-1ubuntu0~18.04.3
   u-boot-imx                      2020.10+dfsg-1ubuntu0~18.04.3
   u-boot-mvebu                    2020.10+dfsg-1ubuntu0~18.04.3
   u-boot-omap                     2020.10+dfsg-1ubuntu0~18.04.3
   u-boot-qcom                     2020.10+dfsg-1ubuntu0~18.04.3
   u-boot-qemu                     2020.10+dfsg-1ubuntu0~18.04.3
   u-boot-rockchip                 2020.10+dfsg-1ubuntu0~18.04.3
   u-boot-rpi                      2020.10+dfsg-1ubuntu0~18.04.3
   u-boot-sunxi                    2020.10+dfsg-1ubuntu0~18.04.3
   u-boot-tegra                    2020.10+dfsg-1ubuntu0~18.04.3
   u-boot-tools                    2020.10+dfsg-1ubuntu0~18.04.3

In general, a standard system update will make all the necessary changes.

References:
   https://ubuntu.com/security/notices/USN-5764-1
   CVE-2022-2347, CVE-2022-30552, CVE-2022-30767, CVE-2022-30790,
   CVE-2022-33103, CVE-2022-33967, CVE-2022-34835

Package Information:
   https://launchpad.net/ubuntu/+source/u-boot/2022.07+dfsg-1ubuntu4.2
   https://launchpad.net/ubuntu/+source/u-boot/2022.01+dfsg-2ubuntu2.3
   https://launchpad.net/ubuntu/+source/u-boot/2021.01+dfsg-3ubuntu0~20.04.5
   https://launchpad.net/ubuntu/+source/u-boot/2020.10+dfsg-1ubuntu0~18.04.3
-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_signature
Type: application/pgp-signature
Size: 833 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20221206/8333d435/attachment.sig>


More information about the ubuntu-security-announce mailing list