** Description changed: - It was discovered that the proc_ns_follow_link() function did not - properly return the LAST_BIND value in the last pathname component as is - expected for procfs symbolic links, which could lead to excessive - freeing of memory and consequent slab corruption. A local, unprivileged - user could use this flaw to crash the system. + The __do_follow_link function in fs/namei.c in the Linux kernel before + 2.6.33 does not properly handle the last pathname component during use + of certain filesystems, which allows local users to cause a denial of + service (incorrect free operations and system crash) via an open system + call.
-- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1333605 Title: CVE-2014-0203 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1333605/+subscriptions -- ubuntu-bugs mailing list [email protected] https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
