cvelist/2018/1000xxx/CVE-2018-1000028.json

65 lines
2.1 KiB
JSON
Raw Normal View History

2018-02-09 18:03:45 -05:00
{
"CVE_data_meta" : {
"ASSIGNER" : "cve-assign@distributedweaknessfiling.org",
"DATE_ASSIGNED" : "1/23/2018 13:16:14",
"ID" : "CVE-2018-1000028",
"REQUESTER" : "ben.hutchings@codethink.co.uk",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "Linux kernel",
"version" : {
"version_data" : [
{
"version_value" : "after commit bdcf0a423ea1 - 4.15-rc4+, 4.14.8+, 4.9.76+, 4.4.111+"
}
]
}
}
]
},
"vendor_name" : "Linux kernel"
}
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "Linux kernel version after commit bdcf0a423ea1 - 4.15-rc4+, 4.14.8+, 4.9.76+, 4.4.111+ contains a Incorrect Access Control vulnerability in NFS server (nfsd) that can result in remote users reading or writing files they should not be able to via NFS. This attack appear to be exploitable via NFS server must export a filesystem with the \"rootsquash\" options enabled. This vulnerability appears to have been fixed in after commit 1995266727fa."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "Incorrect Access Control"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"name" : "https://git.kernel.org/linus/1995266727fa8143897e89b55f5d3c79aa828420",
"refsource" : "CONFIRM",
2018-02-09 18:03:45 -05:00
"url" : "https://git.kernel.org/linus/1995266727fa8143897e89b55f5d3c79aa828420"
}
]
}
}