CVE-2017-7895

The NFSv2 and NFSv3 server implementations in the Linux kernel through 4.10.13 lack certain checks for the end of a buffer, which allows remote attackers to trigger pointer-arithmetic errors or possibly have unspecified other impact via crafted requests, related to fs/nfsd/nfs3xdr.c and fs/nfsd/nfsxdr.c.
References
Link Resource
http://www.debian.org/security/2017/dsa-3886 Third Party Advisory
http://www.securityfocus.com/bid/98085 Third Party Advisory VDB Entry
https://access.redhat.com/errata/RHSA-2017:1615 Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:1616 Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:1647 Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:1715 Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:1723 Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:1766 Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:1798 Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:2412 Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:2428 Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:2429 Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:2472 Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:2732 Third Party Advisory
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=13bf9fbff0e5e099e2b6f003a0ab8ae145436309 Patch Third Party Advisory
https://github.com/torvalds/linux/commit/13bf9fbff0e5e099e2b6f003a0ab8ae145436309 Patch Third Party Advisory
http://www.debian.org/security/2017/dsa-3886 Third Party Advisory
http://www.securityfocus.com/bid/98085 Third Party Advisory VDB Entry
https://access.redhat.com/errata/RHSA-2017:1615 Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:1616 Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:1647 Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:1715 Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:1723 Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:1766 Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:1798 Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:2412 Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:2428 Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:2429 Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:2472 Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:2732 Third Party Advisory
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=13bf9fbff0e5e099e2b6f003a0ab8ae145436309 Patch Third Party Advisory
https://github.com/torvalds/linux/commit/13bf9fbff0e5e099e2b6f003a0ab8ae145436309 Patch Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

History

No history.

Information

Published : 2017-04-28 10:59

Updated : 2025-04-20 01:37


NVD link : CVE-2017-7895

Mitre link : CVE-2017-7895

CVE.ORG link : CVE-2017-7895


JSON object : View

Products Affected

linux

  • linux_kernel

debian

  • debian_linux
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer