CVE-2022-33103
Published: 1 July 2022
Das U-Boot from v2020.10 to v2022.07-rc3 was discovered to contain an out-of-bounds write via the function sqfs_readdir().
Priority
Status
| Package | Release | Status |
|---|---|---|
|
u-boot Launchpad, Ubuntu, Debian |
bionic |
Released
(2020.10+dfsg-1ubuntu0~18.04.3)
|
| focal |
Released
(2021.01+dfsg-3ubuntu0~20.04.5)
|
|
| impish |
Ignored
(end of life)
|
|
| jammy |
Released
(2022.01+dfsg-2ubuntu2.3)
|
|
| kinetic |
Not vulnerable
(2022.07+dfsg-1ubuntu4)
|
|
| lunar |
Not vulnerable
(2022.07+dfsg-1ubuntu4)
|
|
| mantic |
Not vulnerable
(2022.07+dfsg-1ubuntu4)
|
|
| noble |
Not vulnerable
(2022.07+dfsg-1ubuntu4)
|
|
| trusty |
Does not exist
|
|
| upstream |
Needs triage
|
|
| xenial |
Needed
|
|
|
Patches: upstream: https://github.com/u-boot/u-boot/commit/2ac0baab4aff1a0b45067d0b62f00c15f4e86856 |
||
Severity score breakdown
| Parameter | Value |
|---|---|
| Base score | 7.8 |
| Attack vector | Local |
| Attack complexity | Low |
| Privileges required | Low |
| User interaction | None |
| Scope | Unchanged |
| Confidentiality | High |
| Integrity impact | High |
| Availability impact | High |
| Vector | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
References
- https://lore.kernel.org/all/20220609140206.297405-1-miquel.raynal@bootlin.com/
- https://lore.kernel.org/all/CALO=DHFB+yBoXxVr5KcsK0iFdg+e7ywko4-e+72kjbcS8JBfPw@mail.gmail.com/
- https://ubuntu.com/security/notices/USN-5764-1
- https://www.cve.org/CVERecord?id=CVE-2022-33103
- NVD
- Launchpad
- Debian