Vulnerability Name: | CVE-2022-33103 (CCN-230300) | ||||||||||||||||||||
Assigned: | 2022-06-09 | ||||||||||||||||||||
Published: | 2022-06-09 | ||||||||||||||||||||
Updated: | 2022-07-15 | ||||||||||||||||||||
Summary: | Das U-Boot from v2020.10 to v2022.07-rc3 was discovered to contain an out-of-bounds write via the function sqfs_readdir(). | ||||||||||||||||||||
CVSS v3 Severity: | 7.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) 6.8 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
7.3 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
| ||||||||||||||||||||
CVSS v2 Severity: | 4.6 Medium (CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P)
| ||||||||||||||||||||
Vulnerability Type: | CWE-787 | ||||||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2022-33103 Source: XF Type: UNKNOWN denx-cve202233103-code-exec(230300) Source: CCN Type: Lore Kernel Web site [PATCH v2] fs/squashfs: sqfs_read: Prevent arbitrary code execution Source: MISC Type: Exploit, Mailing List, Patch, Third Party Advisory https://lore.kernel.org/all/20220609140206.297405-1-miquel.raynal@bootlin.com/ Source: MISC Type: Exploit, Mailing List, Patch, Third Party Advisory https://lore.kernel.org/all/CALO=DHFB+yBoXxVr5KcsK0iFdg+e7ywko4-e+72kjbcS8JBfPw@mail.gmail.com/ Source: CCN Type: DENX Web site Das U-Boot Source: CCN Type: Mend Vulnerability Database CVE-2022-33103 | ||||||||||||||||||||
Vulnerable Configuration: | Configuration 1:![]() | ||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||
| |||||||||||||||||||||
BACK |