First published: Wed Feb 26 2025(Updated: )
In the Linux kernel, the following vulnerability has been resolved: NFSD: prevent underflow in nfssvc_decode_writeargs() Smatch complains: fs/nfsd/nfsxdr.c:341 nfssvc_decode_writeargs() warn: no lower bound on 'args->len' Change the type to unsigned to prevent this issue.
Credit: 416baaa9-dc9f-4396-8d5f-8c081fb06d67
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | ||
Linux Kernel | <4.9.311 | |
Linux Kernel | >=4.10<4.14.276 | |
Linux Kernel | >=4.15<4.19.238 | |
Linux Kernel | >=4.20<5.4.189 | |
Linux Kernel | >=5.5<5.10.110 | |
Linux Kernel | >=5.11<5.15.33 | |
Linux Kernel | >=5.16<5.16.19 | |
Linux Kernel | >=5.17<5.17.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-49280 is considered a moderate severity vulnerability in the Linux kernel.
To fix CVE-2022-49280, update your Linux kernel to a version higher than 4.9.311 or apply the relevant patches provided by the Linux community.
CVE-2022-49280 affects the NFSD (NFS daemon) code specifically in the function nfssvc_decode_writeargs().
While CVE-2022-49280 does not directly allow remote code execution, it can potentially lead to destabilization of services using NFS.
Linux kernel versions prior to 4.9.311 and between 4.10 to 5.17.2 are vulnerable to CVE-2022-49280.