Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20160713224500.GD12156@kroah.com>
Date: Thu, 14 Jul 2016 07:45:00 +0900
From: Greg KH <greg@...ah.com>
To: oss-security@...ts.openwall.com
Cc: caiqian@...hat.com, cve-assign@...re.org
Subject: Re: Re: cve request: local DoS by overflowing kernel
 mount table using shared bind mount

On Wed, Jul 13, 2016 at 12:59:40PM -0400, cve-assign@...re.org wrote:
> > It was reported that the mount table expands by a power-of-two
> > with each bind mount command.
> 
> > If the system is configured in the way that a non-root user
> > allows bind mount even if with limit number of bind mount
> > allowed, a non-root user could cause a local DoS by quickly
> > overflow the mount table.
> 
> > it will cause a deadlock for the whole system,
> 
> >> form of unlimited memory consumption that is causing the problem
> 
> Use CVE-2016-6213.

A CVE for an "improperly configured system"?  Huh?  What distro has such
a configuration set by default?  This isn't a kernel bug, so what is
this CVE classified as being "against"?  It better not be against the
Linux kernel...

confused,

greg k-h

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.