Hide Forgot
The Linux kernel built with the NFS Server Support(CONFIG_NFSD) is vulnerable to an out-of-bounds memory access issue. It could occur while processing arbitrarily long arguments sent by the NFSv2/NFSv3 PRC clients. A remote RPC user/program could use this flaw to crash the krenel, resulting in DoS. Upstream patch: --------------- -> https://git.kernel.org/linus/e6838a29ecb484c97e4efef9429643b9851fba6e References: ----------- -> https://marc.info/?l=linux-nfs&m=149218228327497&w=2 -> http://seclists.org/oss-sec/2017/q2/195
Created kernel tracking bugs for this issue: Affects: fedora-all [bug 1443617]
Statement: This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, 7 and Red Hat Enterprise MRG 2. Future kernel updates for Red Hat Enterprise Linux 6, 7 and Red Hat Enterprise MRG 2 may address this issue.
This issue has been addressed in the following products: Red Hat Enterprise MRG 2 Via RHSA-2017:1647 https://access.redhat.com/errata/RHSA-2017:1647
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2017:1615 https://access.redhat.com/errata/RHSA-2017:1615
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2017:1616 https://access.redhat.com/errata/RHSA-2017:1616
This issue has been addressed in the following products: Red Hat Enterprise Linux 6 Via RHSA-2018:1319 https://access.redhat.com/errata/RHSA-2018:1319