USN-6523-1

Source
https://ubuntu.com/security/notices/USN-6523-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6523-1.json
JSON Data
https://api.osv.dev/v1/vulns/USN-6523-1
Related
Published
2023-11-29T13:41:02.559727Z
Modified
2023-11-29T13:41:02.559727Z
Summary
u-boot-nezha vulnerability
Details

It was discovered that U-Boot incorrectly handled certain USB DFU download setup packets. A local attacker could use this issue to cause U-Boot to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2022-2347)

Nicolas Bidron and Nicolas Guigo discovered that U-Boot incorrectly handled certain fragmented IP packets. A local attacker could use this issue to cause U-Boot to crash, resulting in a denial of service, or possibly execute arbitrary code. (CVE-2022-30552, CVE-2022-30790)

References

Affected packages

Ubuntu:22.04:LTS / u-boot-nezha

Package

Name
u-boot-nezha
Purl
pkg:deb/ubuntu/u-boot-nezha?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2022.04+git20220405.7446a472-0ubuntu0.4

Affected versions

2021.*

2021.09+git20211008.62392d3-0ubuntu1

2022.*

2022.04+git20220405.7446a472-0ubuntu0.1
2022.04+git20220405.7446a472-0ubuntu0.2
2022.04+git20220405.7446a472-0ubuntu0.3

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_version": "2022.04+git20220405.7446a472-0ubuntu0.4",
            "binary_name": "u-boot-nezha"
        }
    ]
}