Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Wed, 23 Jul 2014 22:36:15 -0400 (EDT)
From: cve-assign@...re.org
To: vvs@...allels.com
Cc: cve-assign@...re.org, oss-security@...ts.openwall.com
Subject: Re: CVE request: kernel: vfs: refcount issues during unmount on symlink

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

> https://bugzilla.redhat.com/show_bug.cgi?id=1122472

> A flaw was found in the way reference counting was handled in the Linux kernel's
> VFS subsystem when unmount on symlink was performed.

Use CVE-2014-5045 for this issue in the mountpoint_last function in
fs/namei.c (not yet patched at
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/tree/fs/namei.c).

- -- 
CVE assignment team, MITRE CVE Numbering Authority
M/S M300
202 Burlington Road, Bedford, MA 01730 USA
[ PGP key available through http://cve.mitre.org/cve/request_id.html ]
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.14 (SunOS)

iQEcBAEBAgAGBQJT0HDIAAoJEKllVAevmvmsVIoIAKE1tc6jm3tD2y6RlHUNOV6u
cAgX0+nBMH0ksSPQvATuzmBqDnndAxmW0xSorhYLYTltpM6ZI3uKmSU1Y/7Yt/xI
FehQi2fhidDH3Z+Z28iHJ85YhznUZQESiIr2nPR5FzIlZS4JkT+tadfAsEZQ8QsA
diJABliZ9wVwzqODywRlkw9sEow57uCKSkW+muungtBmlpIM1arN4J6mRfxK37OT
5iPNgk2ktXJw+J+8bGnbH/aIr3nhCSTiZUEUAujRvd+72gSqvLKsLfUbb45fXEBB
xk3zsksBCKkJEp0qtjImN22t23kOfiIe/WXD1v3KaH2XCB5nUeTgjNPG2bo6uxQ=
=tRtt
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.