In the Linux kernel, the following vulnerability has been resolved:
NFSD: prevent underflow in nfssvc_decode_writeargs()
Smatch complains:
fs/nfsd/nfsxdr.c:341 nfssvc_decode_writeargs()
warn: no lower bound on 'args->len'
Change the type to unsigned to prevent this issue.
References
Configurations
Configuration 1 (hide)
|
History
14 Apr 2025, 20:09
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.5 |
Summary |
|
|
References | () https://git.kernel.org/stable/c/184416d4b98509fb4c3d8fc3d6dc1437896cc159 - Patch | |
References | () https://git.kernel.org/stable/c/1a33e0de60feda402d05ac8a6cf409c19ea3e0b3 - Patch | |
References | () https://git.kernel.org/stable/c/2764af8ce0bf03cc43ee4a11897cab96bde6caae - Patch | |
References | () https://git.kernel.org/stable/c/413d8fefafe531a9442bb623e3fe292a38f88d65 - Patch | |
References | () https://git.kernel.org/stable/c/438068f4912183a59fcb6b7496a06437f7fd4e2b - Patch | |
References | () https://git.kernel.org/stable/c/614a61e1592051cc42d3c38f899c9f7bdaad8a1d - Patch | |
References | () https://git.kernel.org/stable/c/65e21cc042f4c1518c8c55283f53bc725b78419d - Patch | |
References | () https://git.kernel.org/stable/c/85259340fc9bd54e3d567b41b881ecb4d0055da1 - Patch | |
References | () https://git.kernel.org/stable/c/9f0f048c1bfa7867d565a95fd8c28f4484ba1043 - Patch | |
First Time |
Linux linux Kernel
Linux |
|
CWE | CWE-191 | |
CPE | cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* |
26 Feb 2025, 07:01
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-02-26 07:01
Updated : 2025-04-14 20:09
NVD link : CVE-2022-49280
Mitre link : CVE-2022-49280
CVE.ORG link : CVE-2022-49280
JSON object : View
Products Affected
linux
- linux_kernel
CWE
CWE-191
Integer Underflow (Wrap or Wraparound)