A flaw in the Linux Kernel nfsd (network file system) found. Remote user can send RPC over TCP with garbage data added at the end of the message. It can lead to NFSD send/receive buffer overflow on the server side, but without actual out of bounds memory access, so only deny of service possible. Reference: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f90497a16e434c2211c66e3de8e77b17868382b8
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.0 Extended Update Support Via RHSA-2022:8973 https://access.redhat.com/errata/RHSA-2022:8973
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.0 Extended Update Support Via RHSA-2022:8974 https://access.redhat.com/errata/RHSA-2022:8974
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.0 Extended Update Support Via RHSA-2022:9082 https://access.redhat.com/errata/RHSA-2022:9082
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2023:0300 https://access.redhat.com/errata/RHSA-2023:0300
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2023:0334 https://access.redhat.com/errata/RHSA-2023:0334
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2023:0348 https://access.redhat.com/errata/RHSA-2023:0348
Created kernel tracking bugs for this issue: Affects: fedora-all [bug 2167765]
This was fixed for Fedora with the 5.19.17 stable kernel updates.
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2023:0854 https://access.redhat.com/errata/RHSA-2023:0854
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2023:0832 https://access.redhat.com/errata/RHSA-2023:0832
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2023:0839 https://access.redhat.com/errata/RHSA-2023:0839
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2022-43945