CVE-2022-50410
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
18/09/2025
Last modified:
18/09/2025
Description
In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
NFSD: Protect against send buffer overflow in NFSv2 READ<br />
<br />
Since before the git era, NFSD has conserved the number of pages<br />
held by each nfsd thread by combining the RPC receive and send<br />
buffers into a single array of pages. This works because there are<br />
no cases where an operation needs a large RPC Call message and a<br />
large RPC Reply at the same time.<br />
<br />
Once an RPC Call has been received, svc_process() updates<br />
svc_rqst::rq_res to describe the part of rq_pages that can be<br />
used for constructing the Reply. This means that the send buffer<br />
(rq_res) shrinks when the received RPC record containing the RPC<br />
Call is large.<br />
<br />
A client can force this shrinkage on TCP by sending a correctly-<br />
formed RPC Call header contained in an RPC record that is<br />
excessively large. The full maximum payload size cannot be<br />
constructed in that case.
Impact
References to Advisories, Solutions, and Tools
- https://git.kernel.org/stable/c/1868332032eccbab8c1878a0d918193058c0a905
- https://git.kernel.org/stable/c/2007867c5874134f2271eb276398208070049dd3
- https://git.kernel.org/stable/c/2be9331ca6061bc6ea32247266f45b8b21030244
- https://git.kernel.org/stable/c/401bc1f90874280a80b93f23be33a0e7e2d1f912
- https://git.kernel.org/stable/c/ea4c3eee0fd72fcedaa238556044825639cd3607