|
Message-ID: <AEE7726B-5FE6-4972-BEFB-8CED939E875F@synopsys.com> Date: Tue, 2 May 2017 13:08:43 +0000 From: Ari Kauppi <Ari.Kauppi@...opsys.com> To: "oss-security@...ts.openwall.com" <oss-security@...ts.openwall.com> Subject: CVE-2017-7895 Linux kernel: nfsd: Remote arbitrary memory read Hi, Linux kernel NFSv3 server is vulnerable to a remote arbitrary memory read attack. A specifically crafted request can extract chunks of arbitrary memory from both kernel-space and user-space. The attack vector requires write access to a NFS mount on the target host. The issue has been verified to be reproducible on multiple baselines. At least 2.6.32, 3.2, 4.4, 4.8 and 4.10 baselines (and distributions derived from those) have been confirmed to be vulnerable. Fixed in 4.11 release. Most probably this has been introduced about 10 years ago due to fs/nfsd changes for 2.6.22. CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N (7.7 / High) Upstream patch: https://git.kernel.org/linus/13bf9fbff0e5e099e2b6f003a0ab8ae145436309 This issue was found by Ari Kauppi from Synopsys Ltd with Synopsys Defensics fuzzer combined with KASAN. Thanks, -- Ari Kauppi / Synopsys Ltd.
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.