Bug 1451386 (CVE-2017-9059)

Summary: CVE-2017-9059 kernel: Module reference leak due to improper shut down of callback channel on umount
Product: [Other] Security Response Reporter: Adam Mariš <amaris>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED NOTABUG QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: aquini, bhu, dhoward, fhrbata, gansalmon, hwkernel-mgr, iboverma, ichavero, itamar, jforbes, jkacur, jonathan, jross, jwboyer, kernel-maint, kernel-mgr, labbott, lgoncalv, madhu.chinakonda, matt, mchehab, mcressma, nmurray, pholasek, plougher, rt-maint, rvrbovsk, williams
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2019-06-08 03:12:45 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1451996    
Bug Blocks:    

Description Adam Mariš 2017-05-16 14:30:11 UTC
A leakage of module reference and kernel daemon in NFSv4 when NFSv4 mounts are made and then all outstanding NFSv4 mounts are removed. Local attackers with permission to mount NFS filesystems can potentially cause DoS by running the system out of resources.

Fixed by following patches:

https://www.spinics.net/lists/linux-nfs/msg63334.html

which were merged into mainline in following commit:

https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c70422f760c120480fee4de6c38804c72aa26bc1

Comment 1 Adam Mariš 2017-05-18 06:33:11 UTC
Created kernel tracking bugs for this issue:

Affects: fedora-all [bug 1451996]