CVE-2022-50345
NFSD: Protect against send buffer overflow in NFSv3 READ
Description
Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
INFO
Published Date :
Sept. 16, 2025, 5:15 p.m.
Last Modified :
Sept. 29, 2025, 7:15 p.m.
Remotely Exploit :
No
Source :
416baaa9-dc9f-4396-8d5f-8c081fb06d67
Solution
- Apply kernel patches for NFSv3 READ vulnerability.
- Update the Linux kernel to the latest version.
- Restart NFS services after updating.
- Monitor system stability post-update.
We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).
Results are limited to the first 15 repositories due to potential performance issues.
The following list is the news that have been mention
CVE-2022-50345 vulnerability anywhere in the article.
The following table lists the changes that have been made to the
CVE-2022-50345 vulnerability over time.
Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.
-
CVE Rejected by 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Sep. 29, 2025
Action Type Old Value New Value -
CVE Modified by 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Sep. 29, 2025
Action Type Old Value New Value Changed Description In the Linux kernel, the following vulnerability has been resolved: NFSD: Protect against send buffer overflow in NFSv3 READ Since before the git era, NFSD has conserved the number of pages held by each nfsd thread by combining the RPC receive and send buffers into a single array of pages. This works because there are no cases where an operation needs a large RPC Call message and a large RPC Reply at the same time. Once an RPC Call has been received, svc_process() updates svc_rqst::rq_res to describe the part of rq_pages that can be used for constructing the Reply. This means that the send buffer (rq_res) shrinks when the received RPC record containing the RPC Call is large. A client can force this shrinkage on TCP by sending a correctly- formed RPC Call header contained in an RPC record that is excessively large. The full maximum payload size cannot be constructed in that case. Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. Removed Reference kernel.org: https://git.kernel.org/stable/c/309f29361b6bfae96936317376f1114568c5de19 Removed Reference kernel.org: https://git.kernel.org/stable/c/75d9de25a6f833dd0701ca546ac926cabff2b5af Removed Reference kernel.org: https://git.kernel.org/stable/c/bc6c0ed253cd4763dba7541d558e4b704f33176f Removed Reference kernel.org: https://git.kernel.org/stable/c/c23687911f82a63fa2977ce9c992b395e90f8ba0 Removed Reference kernel.org: https://git.kernel.org/stable/c/fa6be9cc6e80ec79892ddf08a8c10cabab9baf38 -
New CVE Received by 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Sep. 16, 2025
Action Type Old Value New Value Added Description In the Linux kernel, the following vulnerability has been resolved: NFSD: Protect against send buffer overflow in NFSv3 READ Since before the git era, NFSD has conserved the number of pages held by each nfsd thread by combining the RPC receive and send buffers into a single array of pages. This works because there are no cases where an operation needs a large RPC Call message and a large RPC Reply at the same time. Once an RPC Call has been received, svc_process() updates svc_rqst::rq_res to describe the part of rq_pages that can be used for constructing the Reply. This means that the send buffer (rq_res) shrinks when the received RPC record containing the RPC Call is large. A client can force this shrinkage on TCP by sending a correctly- formed RPC Call header contained in an RPC record that is excessively large. The full maximum payload size cannot be constructed in that case. Added Reference https://git.kernel.org/stable/c/309f29361b6bfae96936317376f1114568c5de19 Added Reference https://git.kernel.org/stable/c/75d9de25a6f833dd0701ca546ac926cabff2b5af Added Reference https://git.kernel.org/stable/c/bc6c0ed253cd4763dba7541d558e4b704f33176f Added Reference https://git.kernel.org/stable/c/c23687911f82a63fa2977ce9c992b395e90f8ba0 Added Reference https://git.kernel.org/stable/c/fa6be9cc6e80ec79892ddf08a8c10cabab9baf38