Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
SUSE:SLE-15-SP4:Update
u-boot
0018-net-nfs-Fix-CVE-2022-30767-old-CVE-.patch
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File 0018-net-nfs-Fix-CVE-2022-30767-old-CVE-.patch of Package u-boot
From 478ca87c8770615cfc58909b636a326a5677a011 Mon Sep 17 00:00:00 2001 From: Andrea zi0Black Cappa <zi0Black@protonmail.com> Date: Wed, 18 May 2022 16:30:08 +0000 Subject: [PATCH] net: nfs: Fix CVE-2022-30767 (old CVE-2019-14196) This patch mitigates the vulnerability identified via CVE-2019-14196. The previous patch was bypassed/ineffective, and now the vulnerability is identified via CVE-2022-30767. The patch removes the sanity check introduced to mitigate CVE-2019-14196 since it's ineffective. filefh3_length is changed to unsigned type integer, preventing negative numbers from being used during comparison with positive values during size sanity checks. Signed-off-by: Andrea zi0Black Cappa <zi0Black@protonmail.com> (cherry picked from commit bdbf7a05e26f3c5fd437c99e2755ffde186ddc80) Signed-off-by: Matthias Brugger <mbrugger@suse.com> --- net/nfs.c | 4 +--- 1 file changed, 1 insertion(+), 3 deletions(-) diff --git a/net/nfs.c b/net/nfs.c index 70d0e08bde..3003f54aac 100644 --- a/net/nfs.c +++ b/net/nfs.c @@ -57,7 +57,7 @@ static ulong nfs_timeout = NFS_TIMEOUT; static char dirfh[NFS_FHSIZE]; /* NFSv2 / NFSv3 file handle of directory */ static char filefh[NFS3_FHSIZE]; /* NFSv2 / NFSv3 file handle */ -static int filefh3_length; /* (variable) length of filefh when NFSv3 */ +static unsigned int filefh3_length; /* (variable) length of filefh when NFSv3 */ static enum net_loop_state nfs_download_state; static struct in_addr nfs_server_ip; @@ -578,8 +578,6 @@ static int nfs_lookup_reply(uchar *pkt, unsigned len) filefh3_length = ntohl(rpc_pkt.u.reply.data[1]); if (filefh3_length > NFS3_FHSIZE) filefh3_length = NFS3_FHSIZE; - if (((uchar *)&(rpc_pkt.u.reply.data[0]) - (uchar *)(&rpc_pkt) + filefh3_length) > len) - return -NFS_RPC_DROP; memcpy(filefh, rpc_pkt.u.reply.data + 2, filefh3_length); }
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor