CVE-2022-50410
BaseFortify
Publication date: 2025-09-18
Last updated on: 2025-12-11
Assigner: kernel.org
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| linux | linux_kernel | to 5.10.220 (exc) |
| linux | linux_kernel | From 5.11 (inc) to 5.15.75 (exc) |
| linux | linux_kernel | From 5.16 (inc) to 5.19.17 (exc) |
| linux | linux_kernel | From 6.0 (inc) to 6.0.3 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-787 | The product writes data past the end, or before the beginning, of the intended buffer. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in the Linux kernel's NFSD component involves a potential send buffer overflow in NFSv2 READ operations. NFSD manages RPC receive and send buffers in a combined array of pages. When an RPC Call with a large message is received, the send buffer shrinks accordingly. However, a client can exploit this by sending an excessively large but correctly-formed RPC Call header, causing the send buffer to shrink improperly and preventing the full maximum payload size from being constructed, potentially leading to a buffer overflow.
How can this vulnerability impact me? :
This vulnerability could allow a malicious client to cause a send buffer overflow in the NFS server, which may lead to unexpected behavior such as crashes or denial of service. It could disrupt normal NFS operations by preventing the server from properly handling large RPC Calls, potentially impacting system stability and availability.