Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Mon, 02 Aug 2010 11:24:15 +0800
From: Eugene Teo <eugene@...hat.com>
To: oss-security@...ts.openwall.com
CC: "Steven M. Christey" <coley@...us.mitre.org>
Subject: CVE request: kernel: gfs2: rename cases kernel panic

The problem was in the way the gfs2 directory code was trying to re-use
sentinel directory entries. A local, unprivileged user on a gfs2 mounted 
directory can trigger this issue, resulting in a NULL pointer dereference.

https://bugzilla.redhat.com/show_bug.cgi?id=620300

Introduced in upstream commit 71b86f56 (v2.6.19-rc1), and fixed in 
commit 728a756b.

http://git.kernel.org/linus/71b86f562b5eb6f94ea00bba060caa64d0137969
http://git.kernel.org/linus/728a756b8fcd22d80e2dbba8117a8a3aafd3f203

Thanks, Eugene
-- 
main(i) { putchar(182623909 >> (i-1) * 5&31|!!(i<7)<<6) && main(++i); }

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.