Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [day] [month] [year] [list]
Date: Wed, 24 Feb 2010 09:18:35 +0800
From: Eugene Teo <>
CC: "Steven M. Christey" <>
Subject: CVE request: kernel: NFS DoS related to "automount" symlinks

fix LOOKUP_FOLLOW on automount "symlinks"

"Make sure that automount "symlinks" are followed regardless of 
LOOKUP_FOLLOW; it should have no effect on them."

Upstream commit:

+ * This is a temporary kludge to deal with "automount" symlinks; proper
+ * solution is to trigger them on follow_mount(), so that do_lookup()
+ * would DTRT.  To be killed before 2.6.34-final.

This affects kernels version 2.6.18 onwards.

Thanks, Eugene

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ