-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Reference: CERT-EU Security Advisory 2012-0077 Title: Linux kernel security flaw in the NFSv4 implementation [1] Version history: 21.06.2012 Initial publication Summary ======= The NFSv4 implementation in the Linux kernel before 3.2.2 does not properly handle bitmap sizes in GETACL replies, which allows remote NFS servers to cause a denial of service (OOPS) by sending an excessive number of bitmap words. [1,2,6,7] CVE-2011-4131 CVSS v2 Base Score:4.6 (MEDIUM) (AV:A/AC:H/Au:N/C:N/I:N/A:C) [4,5] Vulnerable systems ================== Linux kernel before 3.2.2 Original Details ================ A flaw was found in the way the Linux kernel's Event Poll (epoll) subsystem handled large, nested epoll structures. A local, unprivileged user could use this flaw to cause a denial of service. [2] A remote NFS server (attacker) could exploit this flaw to cause a denial of service.[7] A malicious Network File System version 4 (NFSv4) server could return a crafted reply to a GETACL request, causing a denial of service on the client. [2] What can you do? ================ Fix is available via some vendors [3,6,7] What to tell your users? ======================== N/A More information ================ [1] https://access.redhat.com/security/cve/CVE-2011-4131 [2] https://rhn.redhat.com/errata/RHSA-2012-0862.html [3] https://access.redhat.com/knowledge/articles/11258 [4] http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2011-4131 [5] More information about CVSS is available at: http://www.first.org/cvss/cvss-guide.html [6] http://security-tracker.debian.org/tracker/CVE-2011-4131 [7] http://people.canonical.com/~ubuntu-security/cve/2011/CVE-2011-4131.html Best regards, CERT-EU Pre-configuration Team (http://cert.europa.eu) Phone: +32.2.2990005 / e-mail: cert-eu@ec.europa.eu PGP KeyID 0x46AC4383 FP: 9011 6BE9 D642 DD93 8348 DAFA 27A4 06CA 46AC 4383 Privacy Statement: http://cert.europa.eu/cert/plainedition/en/cert_privacy.html -----BEGIN PGP SIGNATURE----- Version: BCPG v1.39 iQJXBAEBAgBBBQJP5G8kOhxDRVJUIGZvciB0aGUgRXVyb3BlYW4gSW5zdGl0dXRp b25zIDxjZXJ0LWV1QGVjLmV1cm9wYS5ldT4ACgkQJ6QGykasQ4PauQ/+JGZB0uGt D0WWcpJftkXQuHtBawCe7WG2CU0d2RE0Rb84HyOReQA7uB4MDtH6JKzx/q6U5tzy rTuIu/jxtWffSPqaViNZoP3+jli0FGD2/kCiS3DDZbH50SoYATlR0qHKSbX+qrUh w2I6/N8PKpA9ScUown6KXNeOLU7/Db2Z0QhtBk1foWndWB0dT5U4fQfQaOtHg6Ka SB75/416Vs+oNQVeDBRxpMAiEtsOxFtLmz2Lc592N21MNB+pUMzD5va/SfM5C6D6 FWczylo0GoxSxF+2l08/0pevn3OzOfAaGAHl5PgGhQaTOSCfkJjasDGudF6fB6K1 J3NwARZBYFXQ+FAOTURQX2SUc5EWq6RYobDgSB6pg38nrizb/R8Tz3/eZ0PWcNV8 poiYmuVnHOa/YNALXn18OIXK3Eqvfpl/eOJfV36M38UmnsMtMucFBlYlTeGLIOFJ 7bTffoAD1t/JaKziaTlXFevLP313kaeBUKJ0PdDibUyR9I6ZpyayujA/J+keqrYg gR+QWoUErOxVVBYHZKDETJjCETEKiFq8urzmJM7k0/e+18VyYe86khWXXV0B7b0y BvmuZxvNLFmmCWwGVZ4bv74Tqnu0JytEZ6ESgGdY5inykVnKnTbkTFmu4AyEvy2c L3S/UuhTzJvn5/BNDVegWV3wKjFGKFtVECE= =1CAt -----END PGP SIGNATURE-----