PatchSiren cyber security CVE debrief
CVE-2022-43945 Netapp CVE debrief
CVE-2022-43945 is a Linux kernel NFSD buffer overflow that can be triggered by a network client sending a TCP RPC message with trailing garbage data. NVD lists impacted Linux kernel ranges as versions before 5.19.17 and 6.0 through 6.0.1, and the issue is rated high severity because it can cause a denial of service. The record was published on 2022-11-04 and later modified by NVD, but the original publication date is the right timing reference for the vulnerability disclosure.
- Vendor
- Netapp
- Product
- CVE-2022-43945
- CVSS
- HIGH 7.5
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2022-11-04
- Original CVE updated
- 2026-05-12
- Advisory published
- 2022-11-04
- Advisory updated
- 2026-05-12
Who should care
Linux administrators and platform teams running NFS server workloads (NFSD), especially on kernels in the affected version ranges. Security teams should also review any vendor products whose CPEs are mapped to this CVE in the NVD record, including listed NetApp products.
Technical summary
The NVD description says NFSD combines RPC receive and send buffers into a single page array to track pages held by each thread. A client can cause the send buffer to shrink by appending garbage data to an otherwise valid TCP RPC message. That request is still accepted by the RPC layer and forwarded to handlers, but NFSD does not expect the oversized request and can write beyond allocated buffer space. NVD maps the weakness to CWE-770 and Synopsys also lists CWE-131.
Defensive priority
HIGH
Recommended defensive actions
- Verify Linux kernel versions against the NVD ranges and prioritize upgrades to fixed releases at or above 5.19.17 and 6.0.2.
- Confirm whether NFSD/NFS server functionality is enabled on exposed systems and restrict network access to NFS services where possible.
- Review vendor advisories and downstream packages for backported fixes, especially for distributions or appliances that ship their own kernels.
- Monitor for abnormal NFS server instability or crashes on systems running affected kernels.
- Use the NVD and vendor references to validate whether any listed NetApp products in your environment require separate remediation.
Evidence notes
This debrief is based on the NVD CVE record and the linked kernel and vendor references supplied in the source corpus. The core vulnerability description comes from NVD: buffer overflow in Linux kernel NFSD page tracking when a client sends a TCP RPC message with garbage data appended. Version bounds are taken from the NVD CPE criteria: Linux kernel before 5.19.17 and 6.0 through 6.0.1. The linked kernel commit and vendor advisories support that this is a patched kernel issue. No CISA KEV entry was provided in the supplied data.
Official resources
-
CVE-2022-43945 CVE record
CVE.org
-
CVE-2022-43945 NVD detail
NVD
-
Source item URL
nvd_modified
- Source reference
-
Mitigation or vendor reference
[email protected] - Mailing List, Patch, Vendor Advisory
-
Mitigation or vendor reference
[email protected] - Third Party Advisory
-
Source reference
0b142b55-0307-4c5a-b3c9-f314f3fb7c5e
Publicly disclosed on 2022-11-04 per the NVD record. The supplied data does not indicate a CISA KEV listing.