CVE-2022-50345Improper Restriction of Operations within the Bounds of a Memory Buffer in Kernel

2 documents2 sources
Severity
N/A
No vector
EPSS
No EPSS data
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedSep 16

Description

In the Linux kernel, the following vulnerability has been resolved: NFSD: Protect against send buffer overflow in NFSv3 READ Since before the git era, NFSD has conserved the number of pages held by each nfsd thread by combining the RPC receive and send buffers into a single array of pages. This works because there are no cases where an operation needs a large RPC Call message and a large RPC Reply at the same time. Once an RPC Call has been received, svc_process() updates svc_rqst::rq_res to des

Affected Packages1 packages

Debianlinux/linux_kernel< 5.10.221-1+3

🔴Vulnerability Details

2
OSV
CVE-2022-50345: In the Linux kernel, the following vulnerability has been resolved: NFSD: Protect against send buffer overflow in NFSv3 READ Since before the git era,2025-09-16
GHSA
GHSA-2r54-3grc-9jjr: In the Linux kernel, the following vulnerability has been resolved: NFSD: Protect against send buffer overflow in NFSv3 READ Since before the git er2025-09-16
CVE-2022-50345 — Linux Kernel vulnerability | cvebase