First published: Mon May 16 2022(Updated: )
nfs_lookup_reply in net/nfs.c in Das U-Boot through 2022.04 (and through 2022.07-rc2) has an unbounded memcpy with a failed length check, leading to a buffer overflow. NOTE: this issue exists because of an incorrect fix for CVE-2019-14196.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
DENX U-Boot | <=2022.04 | |
DENX U-Boot | =2022.07-rc1 | |
DENX U-Boot | =2022.07-rc2 | |
Fedoraproject Fedora | =36 | |
ubuntu/u-boot | <2020.10+dfsg-1ubuntu0~18.04.3 | 2020.10+dfsg-1ubuntu0~18.04.3 |
ubuntu/u-boot | <2021.01+dfsg-3ubuntu0~20.04.5 | 2021.01+dfsg-3ubuntu0~20.04.5 |
ubuntu/u-boot | <2022.01+dfsg-2ubuntu2.3 | 2022.01+dfsg-2ubuntu2.3 |
debian/u-boot | <=2021.01+dfsg-5 | 2019.01+dfsg-7 2023.01+dfsg-2 2024.01+dfsg-1 2024.01+dfsg-5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-30767 is critical, with a CVSS score of 9.8.
The affected software of CVE-2022-30767 is DENX U-Boot versions 2022.04, 2022.07-rc1, 2022.07-rc2, and Fedora 36.
CVE-2022-30767 is a buffer overflow vulnerability in nfs_lookup_reply in net/nfs.c in Das U-Boot.
To fix CVE-2022-30767, it is recommended to update to the latest version of DENX U-Boot or Fedora.
More information about CVE-2022-30767 can be found at the following references: [GitHub Commit](https://github.com/u-boot/u-boot/commit/5d14ee4e53a81055d34ba280cb8fd90330f22a96), [Denx Mailing List](https://lists.denx.de/pipermail/u-boot/2022-May/483952.html), [Fedora Mailing List](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DF62MVMH3QUGMBDCB3DY2ERQ6EBHTADB/).