CVE-2022-49280

In the Linux kernel, the following vulnerability has been resolved: NFSD: prevent underflow in nfssvc_decode_writeargs() Smatch complains: fs/nfsd/nfsxdr.c:341 nfssvc_decode_writeargs() warn: no lower bound on 'args->len' Change the type to unsigned to prevent this issue.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

14 Apr 2025, 20:09

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
Summary
  • (es) En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: NFSD: evitar desbordamiento en nfssvc_decode_writeargs() Smatch se queja: fs/nfsd/nfsxdr.c:341 nfssvc_decode_writeargs() advierte: no hay límite inferior en 'args->len' Cambie el tipo a sin signo para evitar este problema.
References () https://git.kernel.org/stable/c/184416d4b98509fb4c3d8fc3d6dc1437896cc159 - () https://git.kernel.org/stable/c/184416d4b98509fb4c3d8fc3d6dc1437896cc159 - Patch
References () https://git.kernel.org/stable/c/1a33e0de60feda402d05ac8a6cf409c19ea3e0b3 - () https://git.kernel.org/stable/c/1a33e0de60feda402d05ac8a6cf409c19ea3e0b3 - Patch
References () https://git.kernel.org/stable/c/2764af8ce0bf03cc43ee4a11897cab96bde6caae - () https://git.kernel.org/stable/c/2764af8ce0bf03cc43ee4a11897cab96bde6caae - Patch
References () https://git.kernel.org/stable/c/413d8fefafe531a9442bb623e3fe292a38f88d65 - () https://git.kernel.org/stable/c/413d8fefafe531a9442bb623e3fe292a38f88d65 - Patch
References () https://git.kernel.org/stable/c/438068f4912183a59fcb6b7496a06437f7fd4e2b - () https://git.kernel.org/stable/c/438068f4912183a59fcb6b7496a06437f7fd4e2b - Patch
References () https://git.kernel.org/stable/c/614a61e1592051cc42d3c38f899c9f7bdaad8a1d - () https://git.kernel.org/stable/c/614a61e1592051cc42d3c38f899c9f7bdaad8a1d - Patch
References () https://git.kernel.org/stable/c/65e21cc042f4c1518c8c55283f53bc725b78419d - () https://git.kernel.org/stable/c/65e21cc042f4c1518c8c55283f53bc725b78419d - Patch
References () https://git.kernel.org/stable/c/85259340fc9bd54e3d567b41b881ecb4d0055da1 - () https://git.kernel.org/stable/c/85259340fc9bd54e3d567b41b881ecb4d0055da1 - Patch
References () https://git.kernel.org/stable/c/9f0f048c1bfa7867d565a95fd8c28f4484ba1043 - () https://git.kernel.org/stable/c/9f0f048c1bfa7867d565a95fd8c28f4484ba1043 - Patch
First Time Linux linux Kernel
Linux
CWE CWE-191
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

26 Feb 2025, 07:01

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-26 07:01

Updated : 2025-04-14 20:09


NVD link : CVE-2022-49280

Mitre link : CVE-2022-49280

CVE.ORG link : CVE-2022-49280


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-191

Integer Underflow (Wrap or Wraparound)