
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2022-48827 affects the Linux kernel's NFS server implementation. The vulnerability was discovered when a client attempts to read from an offset near OFFSET_MAX, causing a potential infinite retry loop. The issue stems from the NFS server returning an EINVAL error code that the client does not properly handle (NVD).
The vulnerability occurs due to a commit that aligns buffers to RPC read layers on the client side. When a client reads 0xfff bytes, it gets aligned up to server rsize of 0x1000. If the server has a file of size 0x7fffffffffffffff and the client attempts to read from offset 0x7ffffffffffff000, it causes an lofft overflow in the server. This results in the server returning an NFSERR_INVAL code, which the Linux NFS client does not handle properly despite this being a valid response according to NFS specifications (Kernel Commit).
When exploited, this vulnerability causes the NFS client to enter an infinite retry loop when attempting to read files near the maximum offset size. This can lead to resource exhaustion and potential denial of service conditions (Red Hat).
The fix modifies the server behavior to handle out-of-range READ requests by succeeding and returning a short result instead of NFSERRINVAL. The EOF flag is set in the result to prevent the client from retrying the READ request. This approach is consistent with Solaris NFS servers' behavior. The patch also ensures proper conversion of u64 offset values to loff_t internally (Kernel Commit).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."