|
Message-ID: <20160713224500.GD12156@kroah.com> Date: Thu, 14 Jul 2016 07:45:00 +0900 From: Greg KH <greg@...ah.com> To: oss-security@...ts.openwall.com Cc: caiqian@...hat.com, cve-assign@...re.org Subject: Re: Re: cve request: local DoS by overflowing kernel mount table using shared bind mount On Wed, Jul 13, 2016 at 12:59:40PM -0400, cve-assign@...re.org wrote: > > It was reported that the mount table expands by a power-of-two > > with each bind mount command. > > > If the system is configured in the way that a non-root user > > allows bind mount even if with limit number of bind mount > > allowed, a non-root user could cause a local DoS by quickly > > overflow the mount table. > > > it will cause a deadlock for the whole system, > > >> form of unlimited memory consumption that is causing the problem > > Use CVE-2016-6213. A CVE for an "improperly configured system"? Huh? What distro has such a configuration set by default? This isn't a kernel bug, so what is this CVE classified as being "against"? It better not be against the Linux kernel... confused, greg k-h
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.