Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Fri, 15 Apr 2011 11:43:57 +0200
From: Ludwig Nussel <>
Cc: Jeff Layton <>,
	Steve French <>,
	Suresh Jayaraman <>
Subject: CVE Request: cifs session reuse


When one user has mounted a cifs share that requires authentication,
another user could mount the same share without knowing the
correct password. The following kernel commits fix that:;a=commitdiff;h=4ff67b720c02c36e54d55b88c2931879b7db1cd2;a=commitdiff;h=fc87a40677bbe0937e2ff0642c7e83c9a4813f3d;a=commitdiff;h=24e6cf92fde1f140d8eb0bf7cd24c2c78149b6b2

A way to exploit this would be through mount.cifs if it's
installed setuid root.


 (o_   Ludwig Nussel
SUSE LINUX Products GmbH, GF: Markus Rex, HRB 16746 (AG Nuernberg)

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.