![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
CVE ID: | CVE-2022-30767 |
Description: | nfs_lookup_reply in net/nfs.c in Das U-Boot through 2022.04 (and through 2022.07-rc2) has an unbounded memcpy with a failed length check, leading to a buffer overflow. NOTE: this issue exists because of an incorrect fix for CVE-2019-14196. |
Test IDs: | 1.3.6.1.4.1.25623.1.1.2.2022.2858 1.3.6.1.4.1.25623.1.1.2.2022.2832 1.3.6.1.4.1.25623.1.1.2.2022.2780 1.3.6.1.4.1.25623.1.1.2.2022.2745 |
Cross References: |
Common Vulnerability Exposure (CVE) ID: CVE-2022-30767 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DF62MVMH3QUGMBDCB3DY2ERQ6EBHTADB/ https://github.com/u-boot/u-boot/commit/5d14ee4e53a81055d34ba280cb8fd90330f22a96 https://lists.denx.de/pipermail/u-boot/2022-May/483952.html https://securitylab.github.com/research/uboot-rce-nfs-vulnerability/ |