Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Mon, 2 Aug 2010 16:01:12 -0400 (EDT)
From: Josh Bressers <bressers@...hat.com>
To: oss-security@...ts.openwall.com
Cc: "Steven M. Christey" <coley@...us.mitre.org>
Subject: Re: CVE request: kernel: gfs2: rename cases kernel
 panic

Please use CVE-2010-2798

Thanks.

-- 
    JB


----- "Eugene Teo" <eugene@...hat.com> wrote:

> The problem was in the way the gfs2 directory code was trying to
> re-use
> sentinel directory entries. A local, unprivileged user on a gfs2
> mounted 
> directory can trigger this issue, resulting in a NULL pointer
> dereference.
> 
> https://bugzilla.redhat.com/show_bug.cgi?id=620300
> 
> Introduced in upstream commit 71b86f56 (v2.6.19-rc1), and fixed in 
> commit 728a756b.
> 
> http://git.kernel.org/linus/71b86f562b5eb6f94ea00bba060caa64d0137969
> http://git.kernel.org/linus/728a756b8fcd22d80e2dbba8117a8a3aafd3f203
> 
> Thanks, Eugene
> -- 
> main(i) { putchar(182623909 >> (i-1) * 5&31|!!(i<7)<<6) && main(++i);
> }

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ