Description
The NFS client implementation in the kernel in Red Hat Enterprise Linux (RHEL) 3, when a filesystem is mounted with the noacl option, checks permissions for the open system call via vfs_permission (mode bits) data rather than an NFS ACCESS call to the server, which allows local client processes to obtain a false success status from open calls that the server would deny, and possibly obtain sensitive information about file permissions on the server, as demonstrated in a root_squash environment. NOTE: it is uncertain whether any scenarios involving this issue cross privilege boundaries.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2007-0008 | The NFS client implementation in the kernel in Red Hat Enterprise Linux (RHEL) 3, when a filesystem is mounted with the noacl option, checks permissions for the open system call via vfs_permission (mode bits) data rather than an NFS ACCESS call to the server, which allows local client processes to obtain a false success status from open calls that the server would deny, and possibly obtain sensitive information about file permissions on the server, as demonstrated in a root_squash environment. NOTE: it is uncertain whether any scenarios involving this issue cross privilege boundaries. |
References
| Link | Providers |
|---|---|
| https://bugzilla.redhat.com/show_bug.cgi?id=199715 |
|
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-09-16T20:47:25.494Z
Reserved: 2006-12-19T00:00:00.000Z
Link: CVE-2007-0004
No data.
Status : Modified
Published: 2007-09-18T19:17:00.000
Modified: 2026-04-23T00:35:47.467
Link: CVE-2007-0004
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD