[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20140319212404.GA29059@swift.blarg.de>
Date: Wed, 19 Mar 2014 22:24:04 +0100
From: Max Kellermann <max@...mpel.org>
To: viro@...iv.linux.org.uk, linux-kernel@...r.kernel.org
Subject: Re: [PATCH 1/2] fs/namespace: don't clobber mnt_hash.next while
umounting
On 2014/03/19 22:22, Max Kellermann <mk@...all.com> wrote:
> In the presence of user+mount namespaces, this bug can be exploited by
> any unprivileged user to stall the kernel (denial of service by soft
> lockup).
Proof-of-concept exploit attached.
View attachment "rcumount.c" of type "text/x-csrc" (1879 bytes)
Powered by blists - more mailing lists