Description
nfs_lookup_reply in net/nfs.c in Das U-Boot through 2022.04 (and through 2022.07-rc2) has an unbounded memcpy with a failed length check, leading to a buffer overflow. NOTE: this issue exists because of an incorrect fix for CVE-2019-14196.
References (6)
Core 6
Core References
Patch, Third Party Advisory x_refsource_misc
https://github.com/u-boot/u-boot/commit/5d14ee4e53a81055d34ba280cb8fd90330f22a96
Mailing List, Third Party Advisory x_refsource_misc
https://lists.denx.de/pipermail/u-boot/2022-May/483952.html
Exploit, Third Party Advisory x_refsource_misc
https://securitylab.github.com/research/uboot-rce-nfs-vulnerability/
Mailing List, Third Party Advisory vendor-advisory
x_refsource_fedora
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DF62MVMH3QUGMBDCB3DY2ERQ6EBHTADB/
Patch, Vendor Advisory x_refsource_confirm
https://source.denx.de/u-boot/u-boot/-/commit/bdbf7a05e26f3c5fd437c99e2755ffde186ddc80
Scores
CVSS v3
9.8
EPSS
0.0015
EPSS Percentile
35.0%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-120
Status
published
Products (3)
denx/u-boot
2022.07 rc1 (2 CPE variants)
denx/u-boot
< 2022.04
fedoraproject/fedora
36
Published
May 16, 2022
Tracked Since
Feb 18, 2026