Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Mon, 2 Aug 2010 16:01:12 -0400 (EDT)
From: Josh Bressers <bressers@...hat.com>
To: oss-security@...ts.openwall.com
Cc: "Steven M. Christey" <coley@...us.mitre.org>
Subject: Re: CVE request: kernel: gfs2: rename cases kernel
 panic

Please use CVE-2010-2798

Thanks.

-- 
    JB


----- "Eugene Teo" <eugene@...hat.com> wrote:

> The problem was in the way the gfs2 directory code was trying to
> re-use
> sentinel directory entries. A local, unprivileged user on a gfs2
> mounted 
> directory can trigger this issue, resulting in a NULL pointer
> dereference.
> 
> https://bugzilla.redhat.com/show_bug.cgi?id=620300
> 
> Introduced in upstream commit 71b86f56 (v2.6.19-rc1), and fixed in 
> commit 728a756b.
> 
> http://git.kernel.org/linus/71b86f562b5eb6f94ea00bba060caa64d0137969
> http://git.kernel.org/linus/728a756b8fcd22d80e2dbba8117a8a3aafd3f203
> 
> Thanks, Eugene
> -- 
> main(i) { putchar(182623909 >> (i-1) * 5&31|!!(i<7)<<6) && main(++i);
> }

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.