Lucene search

K
ubuntucveUbuntu.comUB:CVE-2022-30767
HistoryMay 16, 2022 - 12:00 a.m.

CVE-2022-30767

2022-05-1600:00:00
ubuntu.com
ubuntu.com
13

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.003 Low

EPSS

Percentile

68.5%

nfs_lookup_reply in net/nfs.c in Das U-Boot through 2022.04 (and through
2022.07-rc2) has an unbounded memcpy with a failed length check, leading to
a buffer overflow. NOTE: this issue exists because of an incorrect fix for
CVE-2019-14196.

Bugs

Notes

Author Note
sbeattie introduced in 5d14ee4e53a81055d34ba280cb8fd90330f22a96 upstream
OSVersionArchitecturePackageVersionFilename
ubuntu18.04noarchu-boot< 2020.10+dfsg-1ubuntu0~18.04.3UNKNOWN
ubuntu20.04noarchu-boot< 2021.01+dfsg-3ubuntu0~20.04.5UNKNOWN
ubuntu22.04noarchu-boot< 2022.01+dfsg-2ubuntu2.3UNKNOWN
ubuntu16.04noarchu-boot< anyUNKNOWN

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.003 Low

EPSS

Percentile

68.5%