oss-sec mailing list archives

Re: Re: cve request: local DoS by overflowing kernel mount table using shared bind mount


From: Greg KH <greg () kroah com>
Date: Thu, 14 Jul 2016 07:45:00 +0900

On Wed, Jul 13, 2016 at 12:59:40PM -0400, cve-assign () mitre org wrote:
It was reported that the mount table expands by a power-of-two
with each bind mount command.

If the system is configured in the way that a non-root user
allows bind mount even if with limit number of bind mount
allowed, a non-root user could cause a local DoS by quickly
overflow the mount table.

it will cause a deadlock for the whole system,

form of unlimited memory consumption that is causing the problem

Use CVE-2016-6213.

A CVE for an "improperly configured system"?  Huh?  What distro has such
a configuration set by default?  This isn't a kernel bug, so what is
this CVE classified as being "against"?  It better not be against the
Linux kernel...

confused,

greg k-h


Current thread: