SB2022120646 - Ubuntu update for u-boot



SB2022120646 - Ubuntu update for u-boot

Published: December 6, 2022

Security Bulletin ID SB2022120646
Severity
High
Patch available
YES
Number of vulnerabilities 7
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 14% Medium 14% Low 71%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 7 secuirty vulnerabilities.


1) Out-of-bounds write (CVE-ID: CVE-2022-2347)

The vulnerability allows an attacker to compromise vulnerable system.

The vulnerability exists due to a boundary error in the U-Boot DFU implementation when processing download setup packets. An attacker with physical access to device can send a USB DFU download setup packet with a `wLength` greater than 4096 bytes, trigger a heap-based buffer overflow and execute arbitrary code on the system.


2) Buffer overflow (CVE-ID: CVE-2022-30552)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a boundary error in the implementation of IP Packet Defragmentation. A remote attacker on the local network can trigger memory corruption and cause a denial of service condition on the target system.


3) Buffer overflow (CVE-ID: CVE-2022-30767)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error within the nfs_lookup_reply() function in net/nfs.c. A remote attacker can pass specially crafted data to the application, trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Note, the vulnerability exists due to incomplete fix for CVE-2019-14196.


4) Out-of-bounds write (CVE-ID: CVE-2022-30790)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a boundary error when processing untrusted input in the implementation ofIP Packet Defragmentation. A remote attacker on the local netwotk can trigger out-of-bounds write and execute arbitrary code on the target system.


5) Out-of-bounds write (CVE-ID: CVE-2022-33103)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a boundary error within the sqfs_readdir() function when reading local directories. A local user can trigger an out-of-bounds write error and execute arbitrary code with elevated privileges.


6) Heap-based buffer overflow (CVE-ID: CVE-2022-33967)

The vulnerability allows a local attacker to execute arbitrary code on the target system.

The vulnerability exists due to a defect in the metadata reading process. An attacker with physical access can use a specially crafted squashfs image, trigger a heap-based buffer overflow and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


7) Stack-based buffer overflow (CVE-ID: CVE-2022-34835)

The vulnerability allows an attacker to escalate privileges on the system.

The vulnerability exists due to a boundary error in the do_i2c_md() function within the "i2c md" command. An attacker with physical access to device can trigger a stack-based buffer overflow and escalate privileges on the system.


Remediation

Install update from vendor's website.