{"id":"CVE-2022-28733","details":"Integer underflow in grub_net_recv_ip4_packets; A malicious crafted IP packet can lead to an integer underflow in grub_net_recv_ip4_packets() function on rsm-\u003etotal_len value. Under certain circumstances the total_len value may end up wrapping around to a small integer number which will be used in memory allocation. If the attack succeeds in such way, subsequent operations can write past the end of the buffer.","modified":"2026-03-14T11:40:38.919163Z","published":"2023-07-20T01:15:10.140Z","related":["ALSA-2022:5095","ALSA-2022:5099","SUSE-SU-2022:2035-1","SUSE-SU-2022:2036-1","SUSE-SU-2022:2037-1","SUSE-SU-2022:2038-1","SUSE-SU-2022:2039-1","SUSE-SU-2022:2041-1","SUSE-SU-2022:2064-1","SUSE-SU-2022:2073-1","SUSE-SU-2022:2074-1","openSUSE-SU-2024:12137-1"],"references":[{"type":"ADVISORY","url":"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-28733"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20230825-0002/"},{"type":"ADVISORY","url":"https://www.openwall.com/lists/oss-security/2022/06/07/5"}],"affected":[{"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"2.00"},{"fixed":"2.06-3"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-28733.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}