CVE-2022-50410
Gravedad CVSS v3.1:
ALTA
Tipo:
CWE-787
Escritura fuera de límites
Fecha de publicación:
18/09/2025
Última modificación:
14/01/2026
Descripción
*** Pendiente de traducción *** In the Linux kernel, the following vulnerability has been resolved:<br />
<br />
NFSD: Protect against send buffer overflow in NFSv2 READ<br />
<br />
Since before the git era, NFSD has conserved the number of pages<br />
held by each nfsd thread by combining the RPC receive and send<br />
buffers into a single array of pages. This works because there are<br />
no cases where an operation needs a large RPC Call message and a<br />
large RPC Reply at the same time.<br />
<br />
Once an RPC Call has been received, svc_process() updates<br />
svc_rqst::rq_res to describe the part of rq_pages that can be<br />
used for constructing the Reply. This means that the send buffer<br />
(rq_res) shrinks when the received RPC record containing the RPC<br />
Call is large.<br />
<br />
A client can force this shrinkage on TCP by sending a correctly-<br />
formed RPC Call header contained in an RPC record that is<br />
excessively large. The full maximum payload size cannot be<br />
constructed in that case.
Impacto
Puntuación base 3.x
7.80
Gravedad 3.x
ALTA
Productos y versiones vulnerables
| CPE | Desde | Hasta |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.10.220 (excluyendo) | |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.11 (incluyendo) | 5.15.75 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 5.16 (incluyendo) | 5.19.17 (excluyendo) |
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 6.0 (incluyendo) | 6.0.3 (excluyendo) |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- https://git.kernel.org/stable/c/1868332032eccbab8c1878a0d918193058c0a905
- https://git.kernel.org/stable/c/2007867c5874134f2271eb276398208070049dd3
- https://git.kernel.org/stable/c/2be9331ca6061bc6ea32247266f45b8b21030244
- https://git.kernel.org/stable/c/401bc1f90874280a80b93f23be33a0e7e2d1f912
- https://git.kernel.org/stable/c/ea4c3eee0fd72fcedaa238556044825639cd3607



