CVE-2022-50345
Gravedad:
Pendiente de análisis
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
16/09/2025
Última modificación:
17/09/2025
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
NFSD: Protect against send buffer overflow in NFSv3 READ<br />
<br />
Since before the git era, NFSD has conserved the number of pages<br />
held by each nfsd thread by combining the RPC receive and send<br />
buffers into a single array of pages. This works because there are<br />
no cases where an operation needs a large RPC Call message and a<br />
large RPC Reply at the same time.<br />
<br />
Once an RPC Call has been received, svc_process() updates<br />
svc_rqst::rq_res to describe the part of rq_pages that can be<br />
used for constructing the Reply. This means that the send buffer<br />
(rq_res) shrinks when the received RPC record containing the RPC<br />
Call is large.<br />
<br />
A client can force this shrinkage on TCP by sending a correctly-<br />
formed RPC Call header contained in an RPC record that is<br />
excessively large. The full maximum payload size cannot be<br />
constructed in that case.
Impacto
Referencias a soluciones, herramientas e información
- https://git.kernel.org/stable/c/309f29361b6bfae96936317376f1114568c5de19
- https://git.kernel.org/stable/c/75d9de25a6f833dd0701ca546ac926cabff2b5af
- https://git.kernel.org/stable/c/bc6c0ed253cd4763dba7541d558e4b704f33176f
- https://git.kernel.org/stable/c/c23687911f82a63fa2977ce9c992b395e90f8ba0
- https://git.kernel.org/stable/c/fa6be9cc6e80ec79892ddf08a8c10cabab9baf38