========================================================================== Ubuntu Security Notice USN-5764-1 December 06, 2022 u-boot vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 22.10 - Ubuntu 22.04 LTS - Ubuntu 20.04 LTS - Ubuntu 18.04 LTS Summary: Several security issues were fixed in u-boot. Software Description: - u-boot: A boot loader for embedded systems Details: It was discovered that U-Boot incorrectly handled certain USB DFU download setup packets. A local attacker could use this issue to cause U-Boot to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2022-2347) Nicolas Bidron and Nicolas Guigo discovered that U-Boot incorrectly handled certain fragmented IP packets. A local attacker could use this issue to cause U-Boot to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS. (CVE-2022-30552, CVE-2022-30790) It was discovered that U-Boot incorrectly handled certain NFS lookup replies. A remote attacker could use this issue to cause U-Boot to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS. (CVE-2022-30767) Jincheng Wang discovered that U-Boot incorrectly handled certain SquashFS structures. A local attacker could use this issue to cause U-Boot to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS. (CVE-2022-33103) Tatsuhiko Yasumatsu discovered that U-Boot incorrectly handled certain SquashFS structures. A local attacker could use this issue to cause U-Boot to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS. (CVE-2022-33967) It was discovered that U-Boot incorrectly handled the i2c command. A local attacker could use this issue to cause U-Boot to crash, resulting in a denial of service, or possibly execute arbitrary code. This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS. (CVE-2022-34835) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 22.10: u-boot 2022.07+dfsg-1ubuntu4.2 u-boot-amlogic 2022.07+dfsg-1ubuntu4.2 u-boot-exynos 2022.07+dfsg-1ubuntu4.2 u-boot-imx 2022.07+dfsg-1ubuntu4.2 u-boot-microchip 2022.07+dfsg-1ubuntu4.2 u-boot-mvebu 2022.07+dfsg-1ubuntu4.2 u-boot-omap 2022.07+dfsg-1ubuntu4.2 u-boot-qcom 2022.07+dfsg-1ubuntu4.2 u-boot-qemu 2022.07+dfsg-1ubuntu4.2 u-boot-rockchip 2022.07+dfsg-1ubuntu4.2 u-boot-rpi 2022.07+dfsg-1ubuntu4.2 u-boot-sifive 2022.07+dfsg-1ubuntu4.2 u-boot-stm32 2022.07+dfsg-1ubuntu4.2 u-boot-sunxi 2022.07+dfsg-1ubuntu4.2 u-boot-tegra 2022.07+dfsg-1ubuntu4.2 u-boot-tools 2022.07+dfsg-1ubuntu4.2 Ubuntu 22.04 LTS: u-boot 2022.01+dfsg-2ubuntu2.3 u-boot-amlogic 2022.01+dfsg-2ubuntu2.3 u-boot-exynos 2022.01+dfsg-2ubuntu2.3 u-boot-imx 2022.01+dfsg-2ubuntu2.3 u-boot-microchip 2022.01+dfsg-2ubuntu2.3 u-boot-mvebu 2022.01+dfsg-2ubuntu2.3 u-boot-omap 2022.01+dfsg-2ubuntu2.3 u-boot-qcom 2022.01+dfsg-2ubuntu2.3 u-boot-qemu 2022.01+dfsg-2ubuntu2.3 u-boot-rockchip 2022.01+dfsg-2ubuntu2.3 u-boot-rpi 2022.01+dfsg-2ubuntu2.3 u-boot-sifive 2022.01+dfsg-2ubuntu2.3 u-boot-sunxi 2022.01+dfsg-2ubuntu2.3 u-boot-tegra 2022.01+dfsg-2ubuntu2.3 u-boot-tools 2022.01+dfsg-2ubuntu2.3 Ubuntu 20.04 LTS: u-boot 2021.01+dfsg-3ubuntu0~20.04.5 u-boot-amlogic 2021.01+dfsg-3ubuntu0~20.04.5 u-boot-exynos 2021.01+dfsg-3ubuntu0~20.04.5 u-boot-imx 2021.01+dfsg-3ubuntu0~20.04.5 u-boot-mvebu 2021.01+dfsg-3ubuntu0~20.04.5 u-boot-omap 2021.01+dfsg-3ubuntu0~20.04.5 u-boot-qcom 2021.01+dfsg-3ubuntu0~20.04.5 u-boot-qemu 2021.01+dfsg-3ubuntu0~20.04.5 u-boot-rockchip 2021.01+dfsg-3ubuntu0~20.04.5 u-boot-rpi 2021.01+dfsg-3ubuntu0~20.04.5 u-boot-sifive 2021.01+dfsg-3ubuntu0~20.04.5 u-boot-sunxi 2021.01+dfsg-3ubuntu0~20.04.5 u-boot-tegra 2021.01+dfsg-3ubuntu0~20.04.5 u-boot-tools 2021.01+dfsg-3ubuntu0~20.04.5 Ubuntu 18.04 LTS: u-boot 2020.10+dfsg-1ubuntu0~18.04.3 u-boot-amlogic 2020.10+dfsg-1ubuntu0~18.04.3 u-boot-exynos 2020.10+dfsg-1ubuntu0~18.04.3 u-boot-imx 2020.10+dfsg-1ubuntu0~18.04.3 u-boot-mvebu 2020.10+dfsg-1ubuntu0~18.04.3 u-boot-omap 2020.10+dfsg-1ubuntu0~18.04.3 u-boot-qcom 2020.10+dfsg-1ubuntu0~18.04.3 u-boot-qemu 2020.10+dfsg-1ubuntu0~18.04.3 u-boot-rockchip 2020.10+dfsg-1ubuntu0~18.04.3 u-boot-rpi 2020.10+dfsg-1ubuntu0~18.04.3 u-boot-sunxi 2020.10+dfsg-1ubuntu0~18.04.3 u-boot-tegra 2020.10+dfsg-1ubuntu0~18.04.3 u-boot-tools 2020.10+dfsg-1ubuntu0~18.04.3 In general, a standard system update will make all the necessary changes. References: https://ubuntu.com/security/notices/USN-5764-1 CVE-2022-2347, CVE-2022-30552, CVE-2022-30767, CVE-2022-30790, CVE-2022-33103, CVE-2022-33967, CVE-2022-34835 Package Information: https://launchpad.net/ubuntu/+source/u-boot/2022.07+dfsg-1ubuntu4.2 https://launchpad.net/ubuntu/+source/u-boot/2022.01+dfsg-2ubuntu2.3 https://launchpad.net/ubuntu/+source/u-boot/2021.01+dfsg-3ubuntu0~20.04.5 https://launchpad.net/ubuntu/+source/u-boot/2020.10+dfsg-1ubuntu0~18.04.3