Date: Fri, 29 May 2015 22:05:26 +0530 (IST) From: P J P <ppandit@...hat.com> To: oss security list <oss-security@...ts.openwall.com> cc: drew@...dstorm.io Subject: CVE request Linux kernel: ns: user namespaces panic Hello, Linux kernel built with the user namespaces support(CONFIG_USER_NS) is vulnerable to a NULL pointer dereference flaw. It could occur when users in user namespaces do unmount mounts. An unprivileged user could use this flaw to crash the system resulting in DoS. Upstream fixes: --------------- -> https://git.kernel.org/linus/820f9f147dcce2602eefd9b575bbbd9ea14f0953 -> https://git.kernel.org/linus/cd4a40174b71acd021877341684d8bb1dc8ea4ae It was introduced by: --------------------- -> https://git.kernel.org/linus/ce07d891a0891d3c0d0c2d73d577490486b809e1 Thank you Drew Fisher for reporting this issue to Fedora Security Team. Thank you. -- Prasad J Pandit / Red Hat Product Security Team 47AF CE69 3A90 54AA 9045 1053 DD13 3D32 FE5B 041F
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.