Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <4B847E6B.5000806@kernel.sg>
Date: Wed, 24 Feb 2010 09:18:35 +0800
From: Eugene Teo <eugeneteo@...nel.sg>
To: oss-security@...ts.openwall.com
CC: "Steven M. Christey" <coley@...us.mitre.org>
Subject: CVE request: kernel: NFS DoS related to "automount" symlinks

fix LOOKUP_FOLLOW on automount "symlinks"

"Make sure that automount "symlinks" are followed regardless of 
LOOKUP_FOLLOW; it should have no effect on them."

Upstream commit:
http://git.kernel.org/linus/ac278a9c505092dd82077a2446af8f9fc0d9c095

Note:
+ * This is a temporary kludge to deal with "automount" symlinks; proper
+ * solution is to trigger them on follow_mount(), so that do_lookup()
+ * would DTRT.  To be killed before 2.6.34-final.

This affects kernels version 2.6.18 onwards.

https://bugzilla.redhat.com/show_bug.cgi?id=567813

Thanks, Eugene

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.