First published: Tue Oct 18 2011(Updated: )
nfs4_getfacl decoding causes a kernel Oops when a server returns more than 2 GETATTR bitmap words in response to the FATTR4_ACL attribute request. While the NFS client only asks for one attribute (FATTR4_ACL) in the first bitmap word, the NFSv4 protocol allows for the server to return unbounded bitmaps. Upstream commit: e5012d1f3861d18c7f3814e757c1c3ab3741dbcd - incomplete, handles only the case when 2 words are expected and 3 are returned Proposed complete upstream patch: <a href="http://www.spinics.net/lists/linux-nfs/msg25288.html">http://www.spinics.net/lists/linux-nfs/msg25288.html</a> Acknowledgements: Red Hat would like to thank Andy Adamson for reporting this issue.
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Linux | =upstream commit e5012d1f3861d18c7f3814e757c1c3ab3741dbcd |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-747106 is considered high due to the potential for kernel Oops leading to system instability.
To fix REDHAT-BUG-747106, update your Red Hat Linux kernel to a version that includes the patch for this vulnerability.
REDHAT-BUG-747106 affects the NFS client component within the Red Hat Linux Kernel.
The vulnerability is caused when a server returns more than two GETATTR bitmap words in response to the FATTR4_ACL attribute request.
Currently, the recommended action is to apply the kernel update as there are no known effective workarounds for REDHAT-BUG-747106.