Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Fri, 15 Apr 2011 14:32:41 -0400 (EDT)
From: Josh Bressers <bressers@...hat.com>
To: oss-security@...ts.openwall.com
Cc: Jeff Layton <jlayton@...hat.com>, Steve French <sfrench@...ibm.com>,
        Suresh Jayaraman <sjayaraman@...ell.com>, coley <coley@...re.org>
Subject: Re: CVE Request: cifs session reuse

Please use CVE-2011-1585

Thanks.

-- 
    JB


----- Original Message -----
> Hi,
> 
> When one user has mounted a cifs share that requires authentication,
> another user could mount the same share without knowing the
> correct password. The following kernel commits fix that:
> 
> http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=4ff67b720c02c36e54d55b88c2931879b7db1cd2
> http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=fc87a40677bbe0937e2ff0642c7e83c9a4813f3d
> http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=24e6cf92fde1f140d8eb0bf7cd24c2c78149b6b2
> 
> A way to exploit this would be through mount.cifs if it's
> installed setuid root.
> 
> cu
> Ludwig
> 
> --
> (o_ Ludwig Nussel
> //\
> V_/_ http://www.suse.de/
> SUSE LINUX Products GmbH, GF: Markus Rex, HRB 16746 (AG Nuernberg)

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.