PatchSiren

PatchSiren cyber security CVE debrief

CVE-2022-43945 Netapp CVE debrief

CVE-2022-43945 is a Linux kernel NFSD buffer overflow that can be triggered by a network client sending a TCP RPC message with trailing garbage data. NVD lists impacted Linux kernel ranges as versions before 5.19.17 and 6.0 through 6.0.1, and the issue is rated high severity because it can cause a denial of service. The record was published on 2022-11-04 and later modified by NVD, but the original publication date is the right timing reference for the vulnerability disclosure.

Vendor
Netapp
Product
CVE-2022-43945
CVSS
HIGH 7.5
CISA KEV
Not listed in stored evidence
Original CVE published
2022-11-04
Original CVE updated
2026-05-12
Advisory published
2022-11-04
Advisory updated
2026-05-12

Who should care

Linux administrators and platform teams running NFS server workloads (NFSD), especially on kernels in the affected version ranges. Security teams should also review any vendor products whose CPEs are mapped to this CVE in the NVD record, including listed NetApp products.

Technical summary

The NVD description says NFSD combines RPC receive and send buffers into a single page array to track pages held by each thread. A client can cause the send buffer to shrink by appending garbage data to an otherwise valid TCP RPC message. That request is still accepted by the RPC layer and forwarded to handlers, but NFSD does not expect the oversized request and can write beyond allocated buffer space. NVD maps the weakness to CWE-770 and Synopsys also lists CWE-131.

Defensive priority

HIGH

Recommended defensive actions

  • Verify Linux kernel versions against the NVD ranges and prioritize upgrades to fixed releases at or above 5.19.17 and 6.0.2.
  • Confirm whether NFSD/NFS server functionality is enabled on exposed systems and restrict network access to NFS services where possible.
  • Review vendor advisories and downstream packages for backported fixes, especially for distributions or appliances that ship their own kernels.
  • Monitor for abnormal NFS server instability or crashes on systems running affected kernels.
  • Use the NVD and vendor references to validate whether any listed NetApp products in your environment require separate remediation.

Evidence notes

This debrief is based on the NVD CVE record and the linked kernel and vendor references supplied in the source corpus. The core vulnerability description comes from NVD: buffer overflow in Linux kernel NFSD page tracking when a client sends a TCP RPC message with garbage data appended. Version bounds are taken from the NVD CPE criteria: Linux kernel before 5.19.17 and 6.0 through 6.0.1. The linked kernel commit and vendor advisories support that this is a patched kernel issue. No CISA KEV entry was provided in the supplied data.

Official resources

Publicly disclosed on 2022-11-04 per the NVD record. The supplied data does not indicate a CISA KEV listing.