CVE-2017-8797

The NFSv4 server in the Linux kernel before 4.11.3 does not properly validate the layout type when processing the NFSv4 pNFS GETDEVICEINFO or LAYOUTGET operand in a UDP packet from a remote attacker. This type value is uninitialized upon encountering certain error conditions. This value is used as an array index for dereferencing, which leads to an OOPS and eventually a DoS of knfsd and a soft-lockup of the whole system.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

03 Feb 2023, 02:02

Type Values Removed Values Added
References (MISC) http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f961e3f2acae94b727380c0b74e2d3954d0edf79 - Exploit, Vendor Advisory (MISC) http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f961e3f2acae94b727380c0b74e2d3954d0edf79 - Patch, Vendor Advisory
References (SECTRACK) http://www.securitytracker.com/id/1038790 - Third Party Advisory, VDB Entry (SECTRACK) http://www.securitytracker.com/id/1038790 - Broken Link, Third Party Advisory, VDB Entry
References (REDHAT) https://access.redhat.com/errata/RHSA-2017:1842 - (REDHAT) https://access.redhat.com/errata/RHSA-2017:1842 - Third Party Advisory
References (REDHAT) https://access.redhat.com/errata/RHSA-2017:2669 - (REDHAT) https://access.redhat.com/errata/RHSA-2017:2669 - Third Party Advisory
References (REDHAT) https://access.redhat.com/errata/RHSA-2017:2077 - (REDHAT) https://access.redhat.com/errata/RHSA-2017:2077 - Third Party Advisory
References (REDHAT) https://access.redhat.com/errata/RHSA-2017:2437 - (REDHAT) https://access.redhat.com/errata/RHSA-2017:2437 - Third Party Advisory
References (MISC) http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b550a32e60a4941994b437a8d662432a486235a5 - Exploit, Vendor Advisory (MISC) http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b550a32e60a4941994b437a8d662432a486235a5 - Patch, Vendor Advisory

Information

Published : 2017-07-02 17:29

Updated : 2023-12-10 12:15


NVD link : CVE-2017-8797

Mitre link : CVE-2017-8797

CVE.ORG link : CVE-2017-8797


JSON object : View

Products Affected

linux

  • linux_kernel
CWE
CWE-129

Improper Validation of Array Index