[U-Boot] [PATCH v2 2/5] CVE: nfs: fix stack-based buffer overflow in some nfs_handler reply helper functions //RE: [PATCH 2/5] CVE: nfs: fix stack-based buffer overflow in some nfs_handler reply helper functions

Changes in v2: - Add reported-by tag for patch 2/5 -------------------------------------------------------------------------------------------------------------- CVE: nfs: fix stack-based buffer overflow in some nfs_handler reply helper functions
This patch adds a check to nfs_handler to fix buffer overflow for CVE-2019-14197, CVE-2019-14200, CVE-2019-14201, CVE-2019-14202, CVE-2019-14203 and CVE-2019-14204.
Signed-off-by: Cheng Liu liucheng32@huawei.com Reported-by: Fermín Serna fermin@semmle.com --- net/nfs.c | 3 +++ 1 file changed, 3 insertions(+)
diff --git a/net/nfs.c b/net/nfs.c index d6a7f8e..b7cf3b3 100644 --- a/net/nfs.c +++ b/net/nfs.c @@ -732,6 +732,9 @@ static void nfs_handler(uchar *pkt, unsigned dest, struct in_addr sip,
debug("%s\n", __func__);
+ if (len > sizeof(struct rpc_t)) + return; + if (dest != nfs_our_port) return;

On Thu, Aug 29, 2019 at 8:48 AM liucheng (G) liucheng32@huawei.com wrote:
Changes in v2:
- Add reported-by tag for patch 2/5
CVE: nfs: fix stack-based buffer overflow in some nfs_handler reply helper functions
This patch adds a check to nfs_handler to fix buffer overflow for CVE-2019-14197, CVE-2019-14200, CVE-2019-14201, CVE-2019-14202, CVE-2019-14203 and CVE-2019-14204.
Signed-off-by: Cheng Liu liucheng32@huawei.com Reported-by: Fermín Serna fermin@semmle.com
Acked-by: Joe Hershberger joe.hershberger@ni.com

Hi liucheng,
https://patchwork.ozlabs.org/patch/1155275/ was applied to http://git.denx.de/?p=u-boot/u-boot-net.git
Thanks! -Joe
participants (2)
-
Joe Hershberger
-
liucheng (G)