The NFSv2 and NFSv3 server implementations in the Linux kernel through 4.10.13 lack certain checks for the end of a buffer, which allows remote attackers to trigger pointer-arithmetic errors or possibly have unspecified other impact via crafted requests, related to fs/nfsd/nfs3xdr.c and fs/nfsd/nfsxdr.c.
[
{
"events": [
{
"introduced": "0"
},
{
"fixed": "3.2.89"
}
]
},
{
"events": [
{
"introduced": "3.3"
},
{
"fixed": "3.16.44"
}
]
},
{
"events": [
{
"introduced": "3.17.0"
},
{
"fixed": "4.1.40"
}
]
},
{
"events": [
{
"introduced": "4.2"
},
{
"fixed": "4.4.67"
}
]
},
{
"events": [
{
"introduced": "4.5.0"
},
{
"fixed": "4.9.26"
}
]
},
{
"events": [
{
"introduced": "4.10"
},
{
"fixed": "4.10.14"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "9.0"
}
]
}
]
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2017-7895.json"