Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Tue, 01 Feb 2011 23:12:22 -0500
From: Marc Deslauriers <>
Subject: CVE request: fuse


A few more fixes have made their way to FUSE to prevent TOCTTOU symlink
attacks. An unprivileged user was able to unmount arbitrary mounts:;a=commit;h=bf5ffb5fd8558bd799791834def431c0cee5a11f;a=commit;h=1e7607ff89c65b005f69e27aeb1649d624099873;a=commit;h=cbd3a2a84068aae6e3fe32939d88470d712dbf47

Could we please get one or more CVE numbers for them?



Marc Deslauriers
Ubuntu Security Engineer     |
Canonical Ltd.               |

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ