Bug 675858 - NFS kernel panic with port port or security scan on nfs mounts
Summary: NFS kernel panic with port port or security scan on nfs mounts
Keywords:
Status: CLOSED INSUFFICIENT_DATA
Alias: None
Product: Red Hat Enterprise Linux 6
Classification: Red Hat
Component: kernel
Version: 6.3
Hardware: x86_64
OS: Linux
unspecified
high
Target Milestone: rc
: ---
Assignee: nfs-maint
QA Contact: Red Hat Kernel QE team
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2011-02-07 23:41 UTC by John Ferreira
Modified: 2012-01-12 03:39 UTC (History)
6 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2012-01-11 13:20:17 UTC
Target Upstream Version:


Attachments (Terms of Use)

Description John Ferreira 2011-02-07 23:41:13 UTC
Description of problem:
Security scans using nmap or retina causes a kernel crash when a nfs mount is mounted.  Not a problem with no mounts.

Version-Release number of selected component (if applicable):
Red Hat Enterprise Linux Workstation release 6.0 (Santiago)
Kernel 2.6.32-71.14.1.el6.x86_64 

How reproducible:
nmap -sV -O -p 1-65535 [ hostname ] 
or
Retina scan.

Steps to Reproduce:
1.nmap -sV -O -p 1-65535 [ hostname ]  
2. Retina security scanner
3.
  
Actual results:
Kernel panic

Expected results:
List of open ports.

Additional info:
nfs3 or nfs4 kernel panics

Comment 2 Steve Dickson 2011-02-17 16:19:51 UTC
Please post the panic info...

Comment 5 Sachin Prabhu 2011-03-18 12:33:07 UTC
Could you please test this particular issue using the kernel from 
http://rhn.redhat.com/errata/RHSA-2011-0329.html

This fixes an error handling code which resulted in a similar crash.
--
* A use-after-free flaw was found in the Linux kernel's RPC server sockets
implementation. A remote attacker could use this flaw to trigger a denial
of service by sending a corrupted packet to a target system.
(CVE-2011-0714, Important)
--

Comment 6 RHEL Program Management 2011-04-04 02:08:04 UTC
Since RHEL 6.1 External Beta has begun, and this bug remains
unresolved, it has been rejected as it is not proposed as
exception or blocker.

Red Hat invites you to ask your support representative to
propose this request, if appropriate and relevant, in the
next release of Red Hat Enterprise Linux.

Comment 7 Steve Dickson 2011-08-16 18:03:19 UTC
No response to the inquiry... Changing the component to kernel and moving
out to 6.3

Comment 8 RHEL Program Management 2011-10-07 15:22:26 UTC
Since RHEL 6.2 External Beta has begun, and this bug remains
unresolved, it has been rejected as it is not proposed as
exception or blocker.

Red Hat invites you to ask your support representative to
propose this request, if appropriate and relevant, in the
next release of Red Hat Enterprise Linux.

Comment 9 Sachin Prabhu 2012-01-11 13:25:18 UTC
This is probably the same issue described in 
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-0714


Note You need to log in before you can comment on or make changes to this bug.