CVE-2022-48827

7.1 HIGH

📋 TL;DR

A Linux kernel NFS server vulnerability where reading files near the maximum offset (OFFSET_MAX) causes an integer overflow, returning an invalid error that triggers infinite retries from NFS clients. This affects Linux systems running NFSD with large files. The vulnerability can cause denial of service through resource exhaustion.

💻 Affected Systems

Products:
  • Linux kernel NFS server (nfsd)
Versions: Linux kernel versions before fixes in stable releases (check specific kernel versions for your distribution)
Operating Systems: Linux distributions with vulnerable kernel versions
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with NFS server enabled and serving files larger than approximately 8EB minus read buffer size.

📦 What is this software?

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

Linux Kernel by Linux

The Linux Kernel is the core component of the Linux operating system, serving as the critical interface between computer hardware and software processes. As the heart of millions of servers, cloud infrastructure, embedded systems, Android devices, and IoT deployments worldwide, the Linux Kernel mana...

Learn more about Linux Kernel →

⚠️ Risk & Real-World Impact

🔴

Worst Case

NFS clients enter infinite retry loops, consuming server resources and causing denial of service for NFS services, potentially affecting all NFS-mounted filesystems.

🟠

Likely Case

NFS clients experience connection issues and retry storms when accessing very large files near the 8EB limit, causing performance degradation and service disruption.

🟢

If Mitigated

Limited to specific NFS operations on extremely large files, with minimal impact if such files don't exist or NFS isn't used.

🌐 Internet-Facing: MEDIUM - NFS servers exposed to internet could be targeted for DoS, but NFS is typically internal-only.
🏢 Internal Only: MEDIUM - Internal NFS servers could be disrupted, affecting dependent services and users.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires NFS access to trigger specific read operations. The vulnerability is triggered by normal client operations on large files.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Linux kernel stable releases containing commits 0cb4d23ae08c48f6bf3c29a8e5c4a74b8388b960 and related fixes

Vendor Advisory: https://git.kernel.org/stable/c/0cb4d23ae08c48f6bf3c29a8e5c4a74b8388b960

Restart Required: Yes

Instructions:

1. Update Linux kernel to patched version from your distribution vendor. 2. Reboot system to load new kernel. 3. Verify NFS services restart properly.

🔧 Temporary Workarounds

Disable NFS server

linux

Temporarily disable NFS server if not required

systemctl stop nfs-server
systemctl disable nfs-server

Limit NFS access

linux

Restrict NFS access to trusted clients only

Edit /etc/exports to limit client access
Use firewall rules: iptables -A INPUT -p tcp --dport 2049 -s trusted_ip -j ACCEPT

🧯 If You Can't Patch

  • Monitor NFS server logs for EINVAL errors and client retry patterns
  • Implement rate limiting on NFS connections to mitigate retry storm impact

🔍 How to Verify

Check if Vulnerable:

Check kernel version: uname -r and compare with distribution's patched versions. Check if NFS server is running: systemctl status nfs-server

Check Version:

uname -r

Verify Fix Applied:

Verify kernel version after update and test NFS read operations on large files near offset limit

📡 Detection & Monitoring

Log Indicators:

  • NFS server logs showing EINVAL errors
  • Client retry messages in NFS client logs
  • Increased NFS request rates

Network Indicators:

  • Spike in NFS protocol traffic
  • Repeated NFS READ requests from same clients

SIEM Query:

source="nfsd.log" AND "EINVAL" OR source="kernel.log" AND "NFS.*overflow"

🔗 References

📤 Share & Export