oss-sec mailing list archives
Re: CVE-2010-0727 kernel: gfs/gfs2 locking code DoS flaw
From: dann frazier <dannf () debian org>
Date: Wed, 21 Apr 2010 23:25:24 -0600
On Fri, Mar 12, 2010 at 01:17:55PM +0800, Eugene Teo wrote:
static int gfs_lock(struct file *file, int cmd, struct file_lock *fl) { .. if ((ip->i_di.di_mode & (S_ISGID | S_IXGRP)) == S_ISGID) return -ENOLCK; .. } This is a check for mandatory locking where the GFS/GFS2 locking code will skip the lock in case sgid bits are set for the file. This can be triggered to cause a crash on a system mounting a GFS/GFS2 filesystem. I believe only GFS2 is part of the upstream kernel, and GFS only affects Red Hat Enterprise Linux. https://bugzilla.redhat.com/CVE-2010-0727 http://lkml.org/lkml/2010/3/11/269
Looks like a similar issue existed in 9p - can we allocate another CVE for it? commit f78233dd44a110c574fe760ad6f9c1e8741a0d00 Author: Sachin Prabhu <sprabhu () redhat com> Date: Sat Mar 13 09:03:55 2010 -0600 9p: Skip check for mandatory locks when unlocking -- dann frazier
Current thread:
- Re: CVE-2010-0727 kernel: gfs/gfs2 locking code DoS flaw dann frazier (Apr 21)