Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [day] [month] [year] [list]
Date: Tue, 2 May 2017 13:08:43 +0000
From: Ari Kauppi <Ari.Kauppi@...opsys.com>
To: "oss-security@...ts.openwall.com" <oss-security@...ts.openwall.com>
Subject: CVE-2017-7895 Linux kernel: nfsd: Remote arbitrary memory read

Hi,

Linux kernel NFSv3 server is vulnerable to a remote arbitrary memory read attack.

A specifically crafted request can extract chunks of arbitrary memory from both
kernel-space and user-space.

The attack vector requires write access to a NFS mount on the target host.

The issue has been verified to be reproducible on multiple baselines. At least
2.6.32, 3.2, 4.4, 4.8 and 4.10 baselines (and distributions derived from those)
have been confirmed to be vulnerable. Fixed in 4.11 release. Most probably
this has been introduced about 10 years ago due to fs/nfsd changes for 2.6.22.

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N (7.7 / High)

Upstream patch:
https://git.kernel.org/linus/13bf9fbff0e5e099e2b6f003a0ab8ae145436309

This issue was found by Ari Kauppi from Synopsys Ltd with Synopsys Defensics
fuzzer combined with KASAN.

Thanks,

--
Ari Kauppi / Synopsys Ltd.

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ