|
Message-ID: <4B847E6B.5000806@kernel.sg> Date: Wed, 24 Feb 2010 09:18:35 +0800 From: Eugene Teo <eugeneteo@...nel.sg> To: oss-security@...ts.openwall.com CC: "Steven M. Christey" <coley@...us.mitre.org> Subject: CVE request: kernel: NFS DoS related to "automount" symlinks fix LOOKUP_FOLLOW on automount "symlinks" "Make sure that automount "symlinks" are followed regardless of LOOKUP_FOLLOW; it should have no effect on them." Upstream commit: http://git.kernel.org/linus/ac278a9c505092dd82077a2446af8f9fc0d9c095 Note: + * This is a temporary kludge to deal with "automount" symlinks; proper + * solution is to trigger them on follow_mount(), so that do_lookup() + * would DTRT. To be killed before 2.6.34-final. This affects kernels version 2.6.18 onwards. https://bugzilla.redhat.com/show_bug.cgi?id=567813 Thanks, Eugene
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.