Bug 1228054 (CVE-2022-48828) - VUL-0: CVE-2022-48828: kernel: NFSD: Fix ia_size underflow
Summary: VUL-0: CVE-2022-48828: kernel: NFSD: Fix ia_size underflow
Status: NEW
Alias: CVE-2022-48828
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents (show other bugs)
Version: unspecified
Hardware: Other Other
: P3 - Medium : Normal
Target Milestone: ---
Assignee: Kernel Bugs
QA Contact: Security Team bot
URL: https://smash.suse.de/issue/414242/
Whiteboard: CVSSv3.1:SUSE:CVE-2022-48828:5.5:(AV:...
Keywords:
Depends on:
Blocks:
 
Reported: 2024-07-17 12:06 UTC by SMASH SMASH
Modified: 2024-07-17 12:08 UTC (History)
1 user (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description SMASH SMASH 2024-07-17 12:06:21 UTC
In the Linux kernel, the following vulnerability has been resolved:

NFSD: Fix ia_size underflow

iattr::ia_size is a loff_t, which is a signed 64-bit type. NFSv3 and
NFSv4 both define file size as an unsigned 64-bit type. Thus there
is a range of valid file size values an NFS client can send that is
already larger than Linux can handle.

Currently decode_fattr4() dumps a full u64 value into ia_size. If
that value happens to be larger than S64_MAX, then ia_size
underflows. I'm about to fix up the NFSv3 behavior as well, so let's
catch the underflow in the common code path: nfsd_setattr().

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-48828
https://git.kernel.org/pub/scm/linux/security/vulns.git/plain/cve/published/2022/CVE-2022-48828.mbox
https://git.kernel.org/stable/c/38d02ba22e43b6fc7d291cf724bc6e3b7be6626b
https://git.kernel.org/stable/c/8e0ecaf7a7e57b30284d6b3289cc436100fadc48
https://git.kernel.org/stable/c/da22ca1ad548429d7822011c54cfe210718e0aa7
https://git.kernel.org/stable/c/e6faac3f58c7c4176b66f63def17a34232a17b0e
https://www.cve.org/CVERecord?id=CVE-2022-48828
https://bugzilla.redhat.com/show_bug.cgi?id=2298167