Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2017-8797
PUBLISHED
More InfoOfficial Page
Assigner-mitre
Assigner Org ID-8254265b-2729-46b6-b9e3-3dfca2d5bfca
View Known Exploited Vulnerability (KEV) details
Published At-02 Jul, 2017 | 17:00
Updated At-05 Aug, 2024 | 16:48
Rejected At-
▼CVE Numbering Authority (CNA)

The NFSv4 server in the Linux kernel before 4.11.3 does not properly validate the layout type when processing the NFSv4 pNFS GETDEVICEINFO or LAYOUTGET operand in a UDP packet from a remote attacker. This type value is uninitialized upon encountering certain error conditions. This value is used as an array index for dereferencing, which leads to an OOPS and eventually a DoS of knfsd and a soft-lockup of the whole system.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.openwall.com/lists/oss-security/2017/06/27/5
x_refsource_MISC
http://www.securitytracker.com/id/1038790
vdb-entry
x_refsource_SECTRACK
https://access.redhat.com/errata/RHSA-2017:2437
vendor-advisory
x_refsource_REDHAT
https://github.com/torvalds/linux/commit/f961e3f2acae94b727380c0b74e2d3954d0edf79
x_refsource_MISC
https://access.redhat.com/errata/RHSA-2017:2669
vendor-advisory
x_refsource_REDHAT
https://bugzilla.redhat.com/show_bug.cgi?id=1466329
x_refsource_MISC
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f961e3f2acae94b727380c0b74e2d3954d0edf79
x_refsource_MISC
https://github.com/torvalds/linux/commit/b550a32e60a4941994b437a8d662432a486235a5
x_refsource_MISC
https://access.redhat.com/errata/RHSA-2017:2077
vendor-advisory
x_refsource_REDHAT
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.11.3
x_refsource_MISC
https://access.redhat.com/errata/RHSA-2017:1842
vendor-advisory
x_refsource_REDHAT
http://www.securityfocus.com/bid/99298
vdb-entry
x_refsource_BID
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b550a32e60a4941994b437a8d662432a486235a5
x_refsource_MISC
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://www.openwall.com/lists/oss-security/2017/06/27/5
x_refsource_MISC
x_transferred
http://www.securitytracker.com/id/1038790
vdb-entry
x_refsource_SECTRACK
x_transferred
https://access.redhat.com/errata/RHSA-2017:2437
vendor-advisory
x_refsource_REDHAT
x_transferred
https://github.com/torvalds/linux/commit/f961e3f2acae94b727380c0b74e2d3954d0edf79
x_refsource_MISC
x_transferred
https://access.redhat.com/errata/RHSA-2017:2669
vendor-advisory
x_refsource_REDHAT
x_transferred
https://bugzilla.redhat.com/show_bug.cgi?id=1466329
x_refsource_MISC
x_transferred
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f961e3f2acae94b727380c0b74e2d3954d0edf79
x_refsource_MISC
x_transferred
https://github.com/torvalds/linux/commit/b550a32e60a4941994b437a8d662432a486235a5
x_refsource_MISC
x_transferred
https://access.redhat.com/errata/RHSA-2017:2077
vendor-advisory
x_refsource_REDHAT
x_transferred
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.11.3
x_refsource_MISC
x_transferred
https://access.redhat.com/errata/RHSA-2017:1842
vendor-advisory
x_refsource_REDHAT
x_transferred
http://www.securityfocus.com/bid/99298
vdb-entry
x_refsource_BID
x_transferred
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b550a32e60a4941994b437a8d662432a486235a5
x_refsource_MISC
x_transferred
Details not found