Critical severity9.8NVD Advisory· Published Apr 28, 2017· Updated May 13, 2026
CVE-2017-7895
CVE-2017-7895
Description
The NFSv2 and NFSv3 server implementations in the Linux kernel through 4.10.13 lack certain checks for the end of a buffer, which allows remote attackers to trigger pointer-arithmetic errors or possibly have unspecified other impact via crafted requests, related to fs/nfsd/nfs3xdr.c and fs/nfsd/nfsxdr.c.
Affected products
3cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
16- git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/nvdPatchThird Party Advisory
- github.com/torvalds/linux/commit/13bf9fbff0e5e099e2b6f003a0ab8ae145436309nvdPatchThird Party Advisory
- www.debian.org/security/2017/dsa-3886nvdThird Party Advisory
- www.securityfocus.com/bid/98085nvdThird Party AdvisoryVDB Entry
- access.redhat.com/errata/RHSA-2017:1615nvdThird Party Advisory
- access.redhat.com/errata/RHSA-2017:1616nvdThird Party Advisory
- access.redhat.com/errata/RHSA-2017:1647nvdThird Party Advisory
- access.redhat.com/errata/RHSA-2017:1715nvdThird Party Advisory
- access.redhat.com/errata/RHSA-2017:1723nvdThird Party Advisory
- access.redhat.com/errata/RHSA-2017:1766nvdThird Party Advisory
- access.redhat.com/errata/RHSA-2017:1798nvdThird Party Advisory
- access.redhat.com/errata/RHSA-2017:2412nvdThird Party Advisory
- access.redhat.com/errata/RHSA-2017:2428nvdThird Party Advisory
- access.redhat.com/errata/RHSA-2017:2429nvdThird Party Advisory
- access.redhat.com/errata/RHSA-2017:2472nvdThird Party Advisory
- access.redhat.com/errata/RHSA-2017:2732nvdThird Party Advisory
News mentions
0No linked articles in our index yet.