Skip to main content

CVE-2022-48829: Vulnerability in Linux Linux

Medium
VulnerabilityCVE-2022-48829cvecve-2022-48829
Published: Tue Jul 16 2024 (07/16/2024, 11:44:13 UTC)
Source: CVE
Vendor/Project: Linux
Product: Linux

Description

In the Linux kernel, the following vulnerability has been resolved: NFSD: Fix NFSv3 SETATTR/CREATE's handling of large file sizes iattr::ia_size is a loff_t, so these NFSv3 procedures must be careful to deal with incoming client size values that are larger than s64_max without corrupting the value. Silently capping the value results in storing a different value than the client passed in which is unexpected behavior, so remove the min_t() check in decode_sattr3(). Note that RFC 1813 permits only the WRITE procedure to return NFS3ERR_FBIG. We believe that NFSv3 reference implementations also return NFS3ERR_FBIG when ia_size is too large.

AI-Powered Analysis

AILast updated: 06/30/2025, 22:26:13 UTC

Technical Analysis

CVE-2022-48829 is a vulnerability identified in the Linux kernel's implementation of the Network File System version 3 (NFSv3), specifically affecting the NFSD (NFS server daemon) component. The issue concerns the handling of large file sizes in the SETATTR and CREATE procedures of NFSv3. In the Linux kernel, the attribute ia_size, representing file size, is stored as a signed 64-bit integer (loff_t). The vulnerability arises because the NFSv3 procedures were not correctly handling client-supplied file size values that exceed the maximum value for a signed 64-bit integer (s64_max). Previously, the kernel silently capped these oversized values using a min_t() check in the decode_sattr3() function, which could lead to storing a different file size than what the client intended. This behavior is unexpected and can cause inconsistencies or corruption in file metadata. The fix involved removing this min_t() check to ensure that the server does not silently alter the file size value. According to RFC 1813, which defines NFSv3, only the WRITE procedure is allowed to return the NFS3ERR_FBIG error code indicating a file size too large error. The patch aligns with this standard by ensuring that SETATTR and CREATE do not silently cap sizes but handle them appropriately, likely by returning an error when the size is too large. This vulnerability does not have known exploits in the wild at the time of publication and affects Linux kernel versions identified by the commit hash 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2. The issue is subtle and relates to protocol compliance and data integrity rather than direct remote code execution or privilege escalation.

Potential Impact

For European organizations, this vulnerability could lead to data integrity issues on NFSv3 servers running vulnerable Linux kernels. Since NFS is widely used in enterprise environments for shared file storage, especially in sectors like finance, manufacturing, and research, improper handling of large file sizes could cause unexpected behavior such as corrupted file metadata or failed file operations. This could disrupt business-critical applications relying on NFS for file sharing and storage. While the vulnerability does not directly enable remote code execution or privilege escalation, the integrity issues could result in application errors or data loss, impacting availability and reliability of services. Organizations using NFSv3 in mixed environments or with legacy systems may be more exposed. Additionally, non-compliance with protocol standards could complicate interoperability and troubleshooting. Given the lack of known exploits, the immediate risk is moderate, but the potential for future exploitation or accidental data corruption warrants attention.

Mitigation Recommendations

European organizations should prioritize updating their Linux kernel to versions where this vulnerability is patched, specifically applying the fix that removes the min_t() check in decode_sattr3(). System administrators should audit their NFSv3 server deployments to identify vulnerable kernel versions and plan timely upgrades. Additionally, organizations should review their NFS usage policies to limit the size of files created or modified via NFSv3, potentially enforcing size limits at the application or filesystem level to prevent oversized file operations. Monitoring NFS server logs for unusual SETATTR or CREATE operations involving large file sizes can help detect attempts to exploit this issue or accidental triggering. Where possible, migrating from NFSv3 to newer versions like NFSv4, which have improved security and protocol handling, can reduce exposure. Finally, ensure that backups and file integrity monitoring are in place to quickly recover from any data corruption incidents.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Linux
Date Reserved
2024-07-16T11:38:08.903Z
Cisa Enriched
true
Cvss Version
null
State
PUBLISHED

Threat ID: 682d982ec4522896dcbe62e0

Added to database: 5/21/2025, 9:09:02 AM

Last enriched: 6/30/2025, 10:26:13 PM

Last updated: 8/17/2025, 6:38:58 AM

Views: 9

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats