CVE-2022-50235
BaseFortify
Publication date: 2025-09-15
Last updated on: 2025-11-24
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | 5.16 |
| linux | linux_kernel | 5.16 |
| linux | linux_kernel | 5.16 |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
| linux | linux_kernel | From 5.15.160 (inc) to 5.16 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-787 | The product writes data past the end, or before the beginning, of the intended buffer. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a buffer overflow issue in the Linux kernel's NFSD component related to NFSv2 READDIR operations. Specifically, it involves the @count argument, where the previous limit was removed or altered, allowing a potential buffer overflow attack. The fix restores the previous limit on the @count argument to prevent this overflow.
How can this vulnerability impact me? :
This vulnerability could allow an attacker to exploit the buffer overflow in the NFSv2 READDIR operation, potentially leading to system crashes, data corruption, or execution of arbitrary code with kernel privileges, thereby compromising system stability and security.