|
Message-ID: <739C33C0-C0EC-46AF-B1EA-1D1BBEC1E654@synopsys.com> Date: Tue, 2 May 2017 12:58:22 +0000 From: Ari Kauppi <Ari.Kauppi@...opsys.com> To: "oss-security@...ts.openwall.com" <oss-security@...ts.openwall.com> Subject: CVE-2017-7645 Linux kernel: nfsd: remote DoS Hi, Linux kernel NFSv3 and NFSv2 servers are vulnerable to a remote DoS attack. A specifically crafted request can overflow the request/response page array. A few distinct attack vectors exist which all lead to system hang/crash and have possibly other unspecified impact. The attack vectors require at least read access to a NFS mount on the target host. The issue has been verified to be reproducible on multiple baselines. At least 2.6.32, 3.2, 4.4, 4.8 and 4.10 baselines (and distributions derived from those) have been confirmed to be vulnerable. Fixed in 4.11 release. CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H (7.7 / High) Upstream patch: https://git.kernel.org/linus/e6838a29ecb484c97e4efef9429643b9851fba6e This issue was found by Tuomas Haanpää and Matti Kamunen from Synopsys Ltd with Synopsys Defensics fuzzer. Thanks, -- Ari Kauppi / Synopsys Ltd.
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.