First published: Wed Nov 29 2023(Updated: )
It was discovered that U-Boot incorrectly handled certain USB DFU download setup packets. A local attacker could use this issue to cause U-Boot to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2022-2347) Nicolas Bidron and Nicolas Guigo discovered that U-Boot incorrectly handled certain fragmented IP packets. A local attacker could use this issue to cause U-Boot to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2022-30552, CVE-2022-30790)
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/u-boot-nezha | <2022.10-1089-g528ae9bc6c-0ubuntu1.23.04.2 | 2022.10-1089-g528ae9bc6c-0ubuntu1.23.04.2 |
Ubuntu Ubuntu | =23.04 | |
All of | ||
ubuntu/u-boot-nezha | <2022.04+git20220405.7446a472-0ubuntu0.4 | 2022.04+git20220405.7446a472-0ubuntu0.4 |
Ubuntu Ubuntu | =22.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
The vulnerability ID for this advisory is CVE-2022-2347.
The severity of the u-boot-nezha vulnerability is not mentioned in the advisory.
This vulnerability in U-Boot can cause it to crash, resulting in a denial of service, or possibly execute arbitrary code.
A local attacker can exploit this vulnerability by using certain USB DFU download setup packets.
Yes, a fix is available for this vulnerability in the Ubuntu u-boot-nezha package.