Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Fri, 20 Apr 2012 11:10:10 +0800
From: Eugene Teo <eugeneteo@...nel.sg>
To: "Eric W. Biederman" <ebiederm@...ssion.com>
Cc: Marcus Meissner <meissner@...e.de>, OSS Security List <oss-security@...ts.openwall.com>, 
	security@...nel.org, Sukadev Bhattiprolu <sukadev@...ibm.com>, 
	Serge Hallyn <serge.hallyn@...onical.com>, Pavel Emelyanov <xemul@...nvz.org>
Subject: Re: CVE request: pid namespace leak in kernel 3.0 and 3.1

> So we know what is holding the pid namespace reference.
>
> Additional thoughts.
>
> Does echo 3 > /proc/sys/vm/drop_caches clear up the issue?

No.

> Is there a corresponding task_struct leak?

Yes.

> I don't have much of a clue or much concern as this seems fixed in later kernels but I am happy to suggest things to look for to help narrow this down.

I'm helping to provide more information.

Thanks, Eugene

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.