VYPR
Unrated severityNVD Advisory· Published Dec 30, 2025· Updated Apr 15, 2026

CVE-2022-50859

CVE-2022-50859

Description

In the Linux kernel, the following vulnerability has been resolved:

cifs: Fix the error length of VALIDATE_NEGOTIATE_INFO message

Commit d5c7076b772a ("smb3: add smb3.1.1 to default dialect list") extend the dialects from 3 to 4, but forget to decrease the extended length when specific the dialect, then the message length is larger than expected.

This maybe leak some info through network because not initialize the message body.

After apply this patch, the VALIDATE_NEGOTIATE_INFO message length is reduced from 28 bytes to 26 bytes.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

In the Linux kernel, a length miscalculation in VALIDATE_NEGOTIATE_INFO message could leak uninitialized memory over the network.

Root

Cause

A mistake in the Linux kernel's CIFS implementation caused the VALIDATE_NEGOTIATE_INFO message to be longer than expected. Commit d5c7076b772a extended the supported SMB dialects from 3 to 4, but failed to adjust the extended length field accordingly. This resulted in a message of 28 bytes instead of the correct 26 bytes, with the extra bytes left uninitialized [1][2].

Exploitation

An attacker on the same network segment could potentially intercept or trigger the exchange of a VALIDATE_NEGOTIATE_INFO message. Because the message body is not initialized, the extra bytes may contain kernel heap memory, which could be read by the attacker. No authentication is required, as this occurs during the SMB protocol negotiation phase.

Impact

Successful exploitation leads to an information disclosure vulnerability. An attacker could gain insights into kernel memory contents, potentially exposing sensitive data such as cryptographic keys, credentials, or other confidential information.

Mitigation

The fix reduces the message length to 26 bytes, ensuring that the entire message is properly initialized. The stable kernel commits [1][2] apply the correction. Users should update their kernel to a version containing this patch.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

6

Vulnerability mechanics

Generated on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

6

News mentions

0

No linked articles in our index yet.