CVE-2022-43945Incorrect Calculation of Buffer Size in Kernel

Severity
7.5HIGHNVD
OSV8.8OSV7.1OSV6.7OSV6.6OSV6.5OSV6.4OSV5.5
EPSS
0.3%
top 44.06%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedNov 4
Latest updateMar 7

Description

The Linux kernel NFSD implementation prior to versions 5.19.17 and 6.0.2 are vulnerable to buffer overflow. NFSD tracks the number of pages held by each NFSD thread by combining the receive and send buffers of a remote procedure call (RPC) into a single array of pages. A client can force the send buffer to shrink by sending an RPC message over TCP with garbage data added at the end of the message. The RPC message with garbage data is still correctly formed according to the specification and is p

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages7 packages

CVEListV5linux/linux_kernel< 6.0.2
NVDlinux/linux_kernel6.06.0.2+1
Debianlinux/linux_kernel< 5.10.221-1+3
Ubuntulinux/linux_kernel< 4.15.0-202.213+6
debiandebian/linux< linux 6.0.3-1 (bookworm)

Patches

🔴Vulnerability Details

21
OSV
Kernel Live Patch Security Notice2023-03-07
OSV
linux-bluefield vulnerabilities2023-03-03
OSV
linux-oem-6.0 vulnerabilities2023-03-03
OSV
linux-gke vulnerabilities2023-02-15
OSV
linux-dell300x vulnerabilities2023-02-09

📋Vendor Advisories

22
Ubuntu
Kernel Live Patch Security Notice2023-03-07
Ubuntu
Linux kernel (BlueField) vulnerabilities2023-03-03
Ubuntu
Linux kernel (OEM) vulnerabilities2023-03-03
Ubuntu
Linux kernel (GKE) vulnerabilities2023-02-15
Ubuntu
Linux kernel (Azure) vulnerabilities2023-02-09