{"id":"USN-5764-1","summary":"u-boot vulnerabilities","details":"It was discovered that U-Boot incorrectly handled certain USB DFU download\nsetup packets. A local attacker could use this issue to cause U-Boot to\ncrash, resulting in a denial of service, or possibly execute arbitrary\ncode. (CVE-2022-2347)\n\nNicolas Bidron and Nicolas Guigo discovered that U-Boot incorrectly handled\ncertain fragmented IP packets. A local attacker could use this issue to\ncause U-Boot to crash, resulting in a denial of service, or possibly\nexecute arbitrary code. This issue only affected Ubuntu 18.04 LTS, Ubuntu\n20.04 LTS, and Ubuntu 22.04 LTS. (CVE-2022-30552, CVE-2022-30790)\n\nIt was discovered that U-Boot incorrectly handled certain NFS lookup\nreplies. A remote attacker could use this issue to cause U-Boot to crash,\nresulting in a denial of service, or possibly execute arbitrary code. This\nissue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.04\nLTS. (CVE-2022-30767)\n\nJincheng Wang discovered that U-Boot incorrectly handled certain SquashFS\nstructures. A local attacker could use this issue to cause U-Boot to\ncrash, resulting in a denial of service, or possibly execute arbitrary\ncode. This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and\nUbuntu 22.04 LTS. (CVE-2022-33103)\n\nTatsuhiko Yasumatsu discovered that U-Boot incorrectly handled certain\nSquashFS structures. A local attacker could use this issue to cause U-Boot\nto crash, resulting in a denial of service, or possibly execute arbitrary\ncode. This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and\nUbuntu 22.04 LTS. (CVE-2022-33967)\n\nIt was discovered that U-Boot incorrectly handled the i2c command. A local\nattacker could use this issue to cause U-Boot to crash, resulting in a\ndenial of service, or possibly execute arbitrary code. This issue only\naffected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS.\n(CVE-2022-34835)\n","modified":"2026-02-10T04:42:52Z","published":"2022-12-06T12:54:01Z","related":["UBUNTU-CVE-2022-2347","UBUNTU-CVE-2022-30552","UBUNTU-CVE-2022-30767","UBUNTU-CVE-2022-30790","UBUNTU-CVE-2022-33103","UBUNTU-CVE-2022-33967","UBUNTU-CVE-2022-34835"],"upstream":["CVE-2022-2347","CVE-2022-30552","CVE-2022-30767","CVE-2022-30790","CVE-2022-33103","CVE-2022-33967","CVE-2022-34835","UBUNTU-CVE-2022-2347","UBUNTU-CVE-2022-30552","UBUNTU-CVE-2022-30767","UBUNTU-CVE-2022-30790","UBUNTU-CVE-2022-33103","UBUNTU-CVE-2022-33967","UBUNTU-CVE-2022-34835"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-5764-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-2347"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-30552"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-30767"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-30790"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-33103"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-33967"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2022-34835"}],"affected":[{"package":{"name":"u-boot","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/u-boot@2020.10+dfsg-1ubuntu0~18.04.3?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2020.10+dfsg-1ubuntu0~18.04.3"}]}],"versions":["2016.03+dfsg1-6ubuntu2","2018.07~rc3+dfsg1-0ubuntu1~18.04.1","2018.07~rc3+dfsg1-0ubuntu2~18.04.1","2018.07~rc3+dfsg1-0ubuntu3~18.04.1","2019.07+dfsg-1ubuntu4~18.04.1","2020.10+dfsg-1ubuntu0~18.04.2"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"2020.10+dfsg-1ubuntu0~18.04.3","binary_name":"u-boot"},{"binary_version":"2020.10+dfsg-1ubuntu0~18.04.3","binary_name":"u-boot-amlogic"},{"binary_version":"2020.10+dfsg-1ubuntu0~18.04.3","binary_name":"u-boot-exynos"},{"binary_version":"2020.10+dfsg-1ubuntu0~18.04.3","binary_name":"u-boot-imx"},{"binary_version":"2020.10+dfsg-1ubuntu0~18.04.3","binary_name":"u-boot-mvebu"},{"binary_version":"2020.10+dfsg-1ubuntu0~18.04.3","binary_name":"u-boot-omap"},{"binary_version":"2020.10+dfsg-1ubuntu0~18.04.3","binary_name":"u-boot-qcom"},{"binary_version":"2020.10+dfsg-1ubuntu0~18.04.3","binary_name":"u-boot-qemu"},{"binary_version":"2020.10+dfsg-1ubuntu0~18.04.3","binary_name":"u-boot-rockchip"},{"binary_version":"2020.10+dfsg-1ubuntu0~18.04.3","binary_name":"u-boot-rpi"},{"binary_version":"2020.10+dfsg-1ubuntu0~18.04.3","binary_name":"u-boot-sunxi"},{"binary_version":"2020.10+dfsg-1ubuntu0~18.04.3","binary_name":"u-boot-tegra"},{"binary_version":"2020.10+dfsg-1ubuntu0~18.04.3","binary_name":"u-boot-tools"}]},"database_specific":{"cves_map":{"cves":[{"severity":[{"score":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2022-2347"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2022-30552"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2022-30767"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2022-30790"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2022-33103"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2022-33967"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2022-34835"}],"ecosystem":"Ubuntu:18.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5764-1.json"}},{"package":{"name":"u-boot","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/u-boot@2021.01+dfsg-3ubuntu0~20.04.5?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2021.01+dfsg-3ubuntu0~20.04.5"}]}],"versions":["2019.07+dfsg-1ubuntu3","2019.07+dfsg-1ubuntu5","2019.07+dfsg-1ubuntu6","2020.10+dfsg-1ubuntu0~20.04.2","2021.01+dfsg-3ubuntu0~20.04.1","2021.01+dfsg-3ubuntu0~20.04.3","2021.01+dfsg-3ubuntu0~20.04.4"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"2021.01+dfsg-3ubuntu0~20.04.5","binary_name":"u-boot"},{"binary_version":"2021.01+dfsg-3ubuntu0~20.04.5","binary_name":"u-boot-amlogic"},{"binary_version":"2021.01+dfsg-3ubuntu0~20.04.5","binary_name":"u-boot-exynos"},{"binary_version":"2021.01+dfsg-3ubuntu0~20.04.5","binary_name":"u-boot-imx"},{"binary_version":"2021.01+dfsg-3ubuntu0~20.04.5","binary_name":"u-boot-mvebu"},{"binary_version":"2021.01+dfsg-3ubuntu0~20.04.5","binary_name":"u-boot-omap"},{"binary_version":"2021.01+dfsg-3ubuntu0~20.04.5","binary_name":"u-boot-qcom"},{"binary_version":"2021.01+dfsg-3ubuntu0~20.04.5","binary_name":"u-boot-qemu"},{"binary_version":"2021.01+dfsg-3ubuntu0~20.04.5","binary_name":"u-boot-rockchip"},{"binary_version":"2021.01+dfsg-3ubuntu0~20.04.5","binary_name":"u-boot-rpi"},{"binary_version":"2021.01+dfsg-3ubuntu0~20.04.5","binary_name":"u-boot-sifive"},{"binary_version":"2021.01+dfsg-3ubuntu0~20.04.5","binary_name":"u-boot-sunxi"},{"binary_version":"2021.01+dfsg-3ubuntu0~20.04.5","binary_name":"u-boot-tegra"},{"binary_version":"2021.01+dfsg-3ubuntu0~20.04.5","binary_name":"u-boot-tools"}]},"database_specific":{"cves_map":{"cves":[{"severity":[{"score":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2022-2347"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2022-30552"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2022-30767"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2022-30790"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2022-33103"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2022-33967"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2022-34835"}],"ecosystem":"Ubuntu:20.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5764-1.json"}},{"package":{"name":"u-boot","ecosystem":"Ubuntu:22.04:LTS","purl":"pkg:deb/ubuntu/u-boot@2022.01+dfsg-2ubuntu2.3?arch=source&distro=jammy"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2022.01+dfsg-2ubuntu2.3"}]}],"versions":["2021.07+dfsg-0ubuntu8","2021.07+dfsg-0ubuntu9","2021.07+dfsg-0ubuntu10","2022.01+dfsg-2ubuntu1","2022.01+dfsg-2ubuntu2","2022.01+dfsg-2ubuntu2.1"],"ecosystem_specific":{"availability":"No subscription required","binaries":[{"binary_version":"2022.01+dfsg-2ubuntu2.3","binary_name":"u-boot"},{"binary_version":"2022.01+dfsg-2ubuntu2.3","binary_name":"u-boot-amlogic"},{"binary_version":"2022.01+dfsg-2ubuntu2.3","binary_name":"u-boot-exynos"},{"binary_version":"2022.01+dfsg-2ubuntu2.3","binary_name":"u-boot-imx"},{"binary_version":"2022.01+dfsg-2ubuntu2.3","binary_name":"u-boot-microchip"},{"binary_version":"2022.01+dfsg-2ubuntu2.3","binary_name":"u-boot-mvebu"},{"binary_version":"2022.01+dfsg-2ubuntu2.3","binary_name":"u-boot-omap"},{"binary_version":"2022.01+dfsg-2ubuntu2.3","binary_name":"u-boot-qcom"},{"binary_version":"2022.01+dfsg-2ubuntu2.3","binary_name":"u-boot-qemu"},{"binary_version":"2022.01+dfsg-2ubuntu2.3","binary_name":"u-boot-rockchip"},{"binary_version":"2022.01+dfsg-2ubuntu2.3","binary_name":"u-boot-rpi"},{"binary_version":"2022.01+dfsg-2ubuntu2.3","binary_name":"u-boot-sifive"},{"binary_version":"2022.01+dfsg-2ubuntu2.3","binary_name":"u-boot-sunxi"},{"binary_version":"2022.01+dfsg-2ubuntu2.3","binary_name":"u-boot-tegra"},{"binary_version":"2022.01+dfsg-2ubuntu2.3","binary_name":"u-boot-tools"}]},"database_specific":{"cves_map":{"cves":[{"severity":[{"score":"CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2022-2347"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2022-30552"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2022-30767"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2022-30790"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2022-33103"},{"severity":[{"score":"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2022-33967"},{"severity":[{"score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","type":"CVSS_V3"},{"score":"medium","type":"Ubuntu"}],"id":"CVE-2022-34835"}],"ecosystem":"Ubuntu:22.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5764-1.json"}}],"schema_version":"1.7.3"}