=========================================================================Ubuntu Security Notice USN-5764-1
December 06, 2022

u-boot vulnerabilities
=========================================================================
A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 22.10
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS

Summary:

Several security issues were fixed in u-boot.

Software Description:
- u-boot: A boot loader for embedded systems

Details:

It was discovered that U-Boot incorrectly handled certain USB DFU download
setup packets. A local attacker could use this issue to cause U-Boot to
crash, resulting in a denial of service, or possibly execute arbitrary
code. (CVE-2022-2347)

Nicolas Bidron and Nicolas Guigo discovered that U-Boot incorrectly handled
certain fragmented IP packets. A local attacker could use this issue to
cause U-Boot to crash, resulting in a denial of service, or possibly
execute arbitrary code. This issue only affected Ubuntu 18.04 LTS, Ubuntu
20.04 LTS, and Ubuntu 22.04 LTS. (CVE-2022-30552, CVE-2022-30790)

It was discovered that U-Boot incorrectly handled certain NFS lookup
replies. A remote attacker could use this issue to cause U-Boot to crash,
resulting in a denial of service, or possibly execute arbitrary code. This
issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.04
LTS. (CVE-2022-30767)

Jincheng Wang discovered that U-Boot incorrectly handled certain SquashFS
structures. A local attacker could use this issue to cause U-Boot to
crash, resulting in a denial of service, or possibly execute arbitrary
code. This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and
Ubuntu 22.04 LTS. (CVE-2022-33103)

Tatsuhiko Yasumatsu discovered that U-Boot incorrectly handled certain
SquashFS structures. A local attacker could use this issue to cause U-Boot
to crash, resulting in a denial of service, or possibly execute arbitrary
code. This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and
Ubuntu 22.04 LTS. (CVE-2022-33967)

It was discovered that U-Boot incorrectly handled the i2c command. A local
attacker could use this issue to cause U-Boot to crash, resulting in a
denial of service, or possibly execute arbitrary code. This issue only
affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS.
(CVE-2022-34835)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 22.10:
   u-boot                          2022.07+dfsg-1ubuntu4.2
   u-boot-amlogic                  2022.07+dfsg-1ubuntu4.2
   u-boot-exynos                   2022.07+dfsg-1ubuntu4.2
   u-boot-imx                      2022.07+dfsg-1ubuntu4.2
   u-boot-microchip                2022.07+dfsg-1ubuntu4.2
   u-boot-mvebu                    2022.07+dfsg-1ubuntu4.2
   u-boot-omap                     2022.07+dfsg-1ubuntu4.2
   u-boot-qcom                     2022.07+dfsg-1ubuntu4.2
   u-boot-qemu                     2022.07+dfsg-1ubuntu4.2
   u-boot-rockchip                 2022.07+dfsg-1ubuntu4.2
   u-boot-rpi                      2022.07+dfsg-1ubuntu4.2
   u-boot-sifive                   2022.07+dfsg-1ubuntu4.2
   u-boot-stm32                    2022.07+dfsg-1ubuntu4.2
   u-boot-sunxi                    2022.07+dfsg-1ubuntu4.2
   u-boot-tegra                    2022.07+dfsg-1ubuntu4.2
   u-boot-tools                    2022.07+dfsg-1ubuntu4.2

Ubuntu 22.04 LTS:
   u-boot                          2022.01+dfsg-2ubuntu2.3
   u-boot-amlogic                  2022.01+dfsg-2ubuntu2.3
   u-boot-exynos                   2022.01+dfsg-2ubuntu2.3
   u-boot-imx                      2022.01+dfsg-2ubuntu2.3
   u-boot-microchip                2022.01+dfsg-2ubuntu2.3
   u-boot-mvebu                    2022.01+dfsg-2ubuntu2.3
   u-boot-omap                     2022.01+dfsg-2ubuntu2.3
   u-boot-qcom                     2022.01+dfsg-2ubuntu2.3
   u-boot-qemu                     2022.01+dfsg-2ubuntu2.3
   u-boot-rockchip                 2022.01+dfsg-2ubuntu2.3
   u-boot-rpi                      2022.01+dfsg-2ubuntu2.3
   u-boot-sifive                   2022.01+dfsg-2ubuntu2.3
   u-boot-sunxi                    2022.01+dfsg-2ubuntu2.3
   u-boot-tegra                    2022.01+dfsg-2ubuntu2.3
   u-boot-tools                    2022.01+dfsg-2ubuntu2.3

Ubuntu 20.04 LTS:
   u-boot                          2021.01+dfsg-3ubuntu0~20.04.5
   u-boot-amlogic                  2021.01+dfsg-3ubuntu0~20.04.5
   u-boot-exynos                   2021.01+dfsg-3ubuntu0~20.04.5
   u-boot-imx                      2021.01+dfsg-3ubuntu0~20.04.5
   u-boot-mvebu                    2021.01+dfsg-3ubuntu0~20.04.5
   u-boot-omap                     2021.01+dfsg-3ubuntu0~20.04.5
   u-boot-qcom                     2021.01+dfsg-3ubuntu0~20.04.5
   u-boot-qemu                     2021.01+dfsg-3ubuntu0~20.04.5
   u-boot-rockchip                 2021.01+dfsg-3ubuntu0~20.04.5
   u-boot-rpi                      2021.01+dfsg-3ubuntu0~20.04.5
   u-boot-sifive                   2021.01+dfsg-3ubuntu0~20.04.5
   u-boot-sunxi                    2021.01+dfsg-3ubuntu0~20.04.5
   u-boot-tegra                    2021.01+dfsg-3ubuntu0~20.04.5
   u-boot-tools                    2021.01+dfsg-3ubuntu0~20.04.5

Ubuntu 18.04 LTS:
   u-boot                          2020.10+dfsg-1ubuntu0~18.04.3
   u-boot-amlogic                  2020.10+dfsg-1ubuntu0~18.04.3
   u-boot-exynos                   2020.10+dfsg-1ubuntu0~18.04.3
   u-boot-imx                      2020.10+dfsg-1ubuntu0~18.04.3
   u-boot-mvebu                    2020.10+dfsg-1ubuntu0~18.04.3
   u-boot-omap                     2020.10+dfsg-1ubuntu0~18.04.3
   u-boot-qcom                     2020.10+dfsg-1ubuntu0~18.04.3
   u-boot-qemu                     2020.10+dfsg-1ubuntu0~18.04.3
   u-boot-rockchip                 2020.10+dfsg-1ubuntu0~18.04.3
   u-boot-rpi                      2020.10+dfsg-1ubuntu0~18.04.3
   u-boot-sunxi                    2020.10+dfsg-1ubuntu0~18.04.3
   u-boot-tegra                    2020.10+dfsg-1ubuntu0~18.04.3
   u-boot-tools                    2020.10+dfsg-1ubuntu0~18.04.3

In general, a standard system update will make all the necessary changes.

References:
   https://ubuntu.com/security/notices/USN-5764-1
   CVE-2022-2347, CVE-2022-30552, CVE-2022-30767, CVE-2022-30790,
   CVE-2022-33103, CVE-2022-33967, CVE-2022-34835

Package Information:
   https://launchpad.net/ubuntu/+source/u-boot/2022.07+dfsg-1ubuntu4.2
   https://launchpad.net/ubuntu/+source/u-boot/2022.01+dfsg-2ubuntu2.3
   https://launchpad.net/ubuntu/+source/u-boot/2021.01+dfsg-3ubuntu0~20.04.5
   https://launchpad.net/ubuntu/+source/u-boot/2020.10+dfsg-1ubuntu0~18.04.3

Ubuntu 5764-1: U-Boot vulnerabilities

December 6, 2022
Several security issues were fixed in u-boot.

Summary

Update Instructions

The problem can be corrected by updating your system to the following package versions: Ubuntu 22.10: u-boot 2022.07+dfsg-1ubuntu4.2 u-boot-amlogic 2022.07+dfsg-1ubuntu4.2 u-boot-exynos 2022.07+dfsg-1ubuntu4.2 u-boot-imx 2022.07+dfsg-1ubuntu4.2 u-boot-microchip 2022.07+dfsg-1ubuntu4.2 u-boot-mvebu 2022.07+dfsg-1ubuntu4.2 u-boot-omap 2022.07+dfsg-1ubuntu4.2 u-boot-qcom 2022.07+dfsg-1ubuntu4.2 u-boot-qemu 2022.07+dfsg-1ubuntu4.2 u-boot-rockchip 2022.07+dfsg-1ubuntu4.2 u-boot-rpi 2022.07+dfsg-1ubuntu4.2 u-boot-sifive 2022.07+dfsg-1ubuntu4.2 u-boot-stm32 2022.07+dfsg-1ubuntu4.2 u-boot-sunxi 2022.07+dfsg-1ubuntu4.2 u-boot-tegra 2022.07+dfsg-1ubuntu4.2 u-boot-tools 2022.07+dfsg-1ubuntu4.2 Ubuntu 22.04 LTS: u-boot 2022.01+dfsg-2ubuntu2.3 u-boot-amlogic 2022.01+dfsg-2ubuntu2.3 u-boot-exynos 2022.01+dfsg-2ubuntu2.3 u-boot-imx 2022.01+dfsg-2ubuntu2.3 u-boot-microchip 2022.01+dfsg-2ubuntu2.3 u-boot-mvebu 2022.01+dfsg-2ubuntu2.3 u-boot-omap 2022.01+dfsg-2ubuntu2.3 u-boot-qcom 2022.01+dfsg-2ubuntu2.3 u-boot-qemu 2022.01+dfsg-2ubuntu2.3 u-boot-rockchip 2022.01+dfsg-2ubuntu2.3 u-boot-rpi 2022.01+dfsg-2ubuntu2.3 u-boot-sifive 2022.01+dfsg-2ubuntu2.3 u-boot-sunxi 2022.01+dfsg-2ubuntu2.3 u-boot-tegra 2022.01+dfsg-2ubuntu2.3 u-boot-tools 2022.01+dfsg-2ubuntu2.3 Ubuntu 20.04 LTS: u-boot 2021.01+dfsg-3ubuntu0~20.04.5 u-boot-amlogic 2021.01+dfsg-3ubuntu0~20.04.5 u-boot-exynos 2021.01+dfsg-3ubuntu0~20.04.5 u-boot-imx 2021.01+dfsg-3ubuntu0~20.04.5 u-boot-mvebu 2021.01+dfsg-3ubuntu0~20.04.5 u-boot-omap 2021.01+dfsg-3ubuntu0~20.04.5 u-boot-qcom 2021.01+dfsg-3ubuntu0~20.04.5 u-boot-qemu 2021.01+dfsg-3ubuntu0~20.04.5 u-boot-rockchip 2021.01+dfsg-3ubuntu0~20.04.5 u-boot-rpi 2021.01+dfsg-3ubuntu0~20.04.5 u-boot-sifive 2021.01+dfsg-3ubuntu0~20.04.5 u-boot-sunxi 2021.01+dfsg-3ubuntu0~20.04.5 u-boot-tegra 2021.01+dfsg-3ubuntu0~20.04.5 u-boot-tools 2021.01+dfsg-3ubuntu0~20.04.5 Ubuntu 18.04 LTS: u-boot 2020.10+dfsg-1ubuntu0~18.04.3 u-boot-amlogic 2020.10+dfsg-1ubuntu0~18.04.3 u-boot-exynos 2020.10+dfsg-1ubuntu0~18.04.3 u-boot-imx 2020.10+dfsg-1ubuntu0~18.04.3 u-boot-mvebu 2020.10+dfsg-1ubuntu0~18.04.3 u-boot-omap 2020.10+dfsg-1ubuntu0~18.04.3 u-boot-qcom 2020.10+dfsg-1ubuntu0~18.04.3 u-boot-qemu 2020.10+dfsg-1ubuntu0~18.04.3 u-boot-rockchip 2020.10+dfsg-1ubuntu0~18.04.3 u-boot-rpi 2020.10+dfsg-1ubuntu0~18.04.3 u-boot-sunxi 2020.10+dfsg-1ubuntu0~18.04.3 u-boot-tegra 2020.10+dfsg-1ubuntu0~18.04.3 u-boot-tools 2020.10+dfsg-1ubuntu0~18.04.3 In general, a standard system update will make all the necessary changes.

References

https://ubuntu.com/security/notices/USN-5764-1

CVE-2022-2347, CVE-2022-30552, CVE-2022-30767, CVE-2022-30790,

CVE-2022-33103, CVE-2022-33967, CVE-2022-34835

Severity
December 06, 2022

Package Information

https://launchpad.net/ubuntu/+source/u-boot/2022.07+dfsg-1ubuntu4.2 https://launchpad.net/ubuntu/+source/u-boot/2022.01+dfsg-2ubuntu2.3 https://launchpad.net/ubuntu/+source/u-boot/2021.01+dfsg-3ubuntu0~20.04.5 https://launchpad.net/ubuntu/+source/u-boot/2020.10+dfsg-1ubuntu0~18.04.3

Related News