Ubuntu 6333 Published by

An U-Boot security update has been released for Ubuntu Linux 18.04 LTS, 20.04 LTS, 22.04 LTS, and 22.10.



USN-5764-1: U-Boot vulnerabilities


==========================================================================
Ubuntu Security Notice USN-5764-1
December 06, 2022

u-boot vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 22.10
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS

Summary:

Several security issues were fixed in u-boot.

Software Description:
- u-boot: A boot loader for embedded systems

Details:

It was discovered that U-Boot incorrectly handled certain USB DFU download
setup packets. A local attacker could use this issue to cause U-Boot to
crash, resulting in a denial of service, or possibly execute arbitrary
code. (CVE-2022-2347)

Nicolas Bidron and Nicolas Guigo discovered that U-Boot incorrectly handled
certain fragmented IP packets. A local attacker could use this issue to
cause U-Boot to crash, resulting in a denial of service, or possibly
execute arbitrary code. This issue only affected Ubuntu 18.04 LTS, Ubuntu
20.04 LTS, and Ubuntu 22.04 LTS. (CVE-2022-30552, CVE-2022-30790)

It was discovered that U-Boot incorrectly handled certain NFS lookup
replies. A remote attacker could use this issue to cause U-Boot to crash,
resulting in a denial of service, or possibly execute arbitrary code. This
issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.04
LTS. (CVE-2022-30767)

Jincheng Wang discovered that U-Boot incorrectly handled certain SquashFS
structures. A local attacker could use this issue to cause U-Boot to
crash, resulting in a denial of service, or possibly execute arbitrary
code. This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and
Ubuntu 22.04 LTS. (CVE-2022-33103)

Tatsuhiko Yasumatsu discovered that U-Boot incorrectly handled certain
SquashFS structures. A local attacker could use this issue to cause U-Boot
to crash, resulting in a denial of service, or possibly execute arbitrary
code. This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and
Ubuntu 22.04 LTS. (CVE-2022-33967)

It was discovered that U-Boot incorrectly handled the i2c command. A local
attacker could use this issue to cause U-Boot to crash, resulting in a
denial of service, or possibly execute arbitrary code. This issue only
affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS.
(CVE-2022-34835)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 22.10:
u-boot 2022.07+dfsg-1ubuntu4.2
u-boot-amlogic 2022.07+dfsg-1ubuntu4.2
u-boot-exynos 2022.07+dfsg-1ubuntu4.2
u-boot-imx 2022.07+dfsg-1ubuntu4.2
u-boot-microchip 2022.07+dfsg-1ubuntu4.2
u-boot-mvebu 2022.07+dfsg-1ubuntu4.2
u-boot-omap 2022.07+dfsg-1ubuntu4.2
u-boot-qcom 2022.07+dfsg-1ubuntu4.2
u-boot-qemu 2022.07+dfsg-1ubuntu4.2
u-boot-rockchip 2022.07+dfsg-1ubuntu4.2
u-boot-rpi 2022.07+dfsg-1ubuntu4.2
u-boot-sifive 2022.07+dfsg-1ubuntu4.2
u-boot-stm32 2022.07+dfsg-1ubuntu4.2
u-boot-sunxi 2022.07+dfsg-1ubuntu4.2
u-boot-tegra 2022.07+dfsg-1ubuntu4.2
u-boot-tools 2022.07+dfsg-1ubuntu4.2

Ubuntu 22.04 LTS:
u-boot 2022.01+dfsg-2ubuntu2.3
u-boot-amlogic 2022.01+dfsg-2ubuntu2.3
u-boot-exynos 2022.01+dfsg-2ubuntu2.3
u-boot-imx 2022.01+dfsg-2ubuntu2.3
u-boot-microchip 2022.01+dfsg-2ubuntu2.3
u-boot-mvebu 2022.01+dfsg-2ubuntu2.3
u-boot-omap 2022.01+dfsg-2ubuntu2.3
u-boot-qcom 2022.01+dfsg-2ubuntu2.3
u-boot-qemu 2022.01+dfsg-2ubuntu2.3
u-boot-rockchip 2022.01+dfsg-2ubuntu2.3
u-boot-rpi 2022.01+dfsg-2ubuntu2.3
u-boot-sifive 2022.01+dfsg-2ubuntu2.3
u-boot-sunxi 2022.01+dfsg-2ubuntu2.3
u-boot-tegra 2022.01+dfsg-2ubuntu2.3
u-boot-tools 2022.01+dfsg-2ubuntu2.3

Ubuntu 20.04 LTS:
u-boot 2021.01+dfsg-3ubuntu0~20.04.5
u-boot-amlogic 2021.01+dfsg-3ubuntu0~20.04.5
u-boot-exynos 2021.01+dfsg-3ubuntu0~20.04.5
u-boot-imx 2021.01+dfsg-3ubuntu0~20.04.5
u-boot-mvebu 2021.01+dfsg-3ubuntu0~20.04.5
u-boot-omap 2021.01+dfsg-3ubuntu0~20.04.5
u-boot-qcom 2021.01+dfsg-3ubuntu0~20.04.5
u-boot-qemu 2021.01+dfsg-3ubuntu0~20.04.5
u-boot-rockchip 2021.01+dfsg-3ubuntu0~20.04.5
u-boot-rpi 2021.01+dfsg-3ubuntu0~20.04.5
u-boot-sifive 2021.01+dfsg-3ubuntu0~20.04.5
u-boot-sunxi 2021.01+dfsg-3ubuntu0~20.04.5
u-boot-tegra 2021.01+dfsg-3ubuntu0~20.04.5
u-boot-tools 2021.01+dfsg-3ubuntu0~20.04.5

Ubuntu 18.04 LTS:
u-boot 2020.10+dfsg-1ubuntu0~18.04.3
u-boot-amlogic 2020.10+dfsg-1ubuntu0~18.04.3
u-boot-exynos 2020.10+dfsg-1ubuntu0~18.04.3
u-boot-imx 2020.10+dfsg-1ubuntu0~18.04.3
u-boot-mvebu 2020.10+dfsg-1ubuntu0~18.04.3
u-boot-omap 2020.10+dfsg-1ubuntu0~18.04.3
u-boot-qcom 2020.10+dfsg-1ubuntu0~18.04.3
u-boot-qemu 2020.10+dfsg-1ubuntu0~18.04.3
u-boot-rockchip 2020.10+dfsg-1ubuntu0~18.04.3
u-boot-rpi 2020.10+dfsg-1ubuntu0~18.04.3
u-boot-sunxi 2020.10+dfsg-1ubuntu0~18.04.3
u-boot-tegra 2020.10+dfsg-1ubuntu0~18.04.3
u-boot-tools 2020.10+dfsg-1ubuntu0~18.04.3

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-5764-1
CVE-2022-2347, CVE-2022-30552, CVE-2022-30767, CVE-2022-30790,
CVE-2022-33103, CVE-2022-33967, CVE-2022-34835

Package Information:
https://launchpad.net/ubuntu/+source/u-boot/2022.07+dfsg-1ubuntu4.2
https://launchpad.net/ubuntu/+source/u-boot/2022.01+dfsg-2ubuntu2.3
https://launchpad.net/ubuntu/+source/u-boot/2021.01+dfsg-3ubuntu0~20.04.5
https://launchpad.net/ubuntu/+source/u-boot/2020.10+dfsg-1ubuntu0~18.04.3