From mboxrd@z Thu Jan 1 00:00:00 1970 From: Vitaliy Gusev Subject: [PATCH 0/2] nfsv4: Fix two remote DOS vulnerabilities v2 Date: Thu, 10 Feb 2011 14:54:54 +0300 Message-ID: <1297338894.3667.0.camel@vT510> Mime-Version: 1.0 Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: 8BIT Cc: linux-fsdevel , David Howells , linux-nfs-u79uwXL29TY76Z2rM5mHXA@public.gmane.org To: Trond Myklebust , Al Viro Return-path: Sender: linux-nfs-owner-u79uwXL29TY76Z2rM5mHXA@public.gmane.org List-Id: linux-fsdevel.vger.kernel.org Hello! Next patches fix two NFSv4 client vulnerabilities. First (memory corruption) can be raises anytime whereas second (dereference ->lookup and call NULL pointer) can be raised during mount. Repeatability 100% -- Thanks, Vitaliy Gusev -- To unsubscribe from this list: send the line "unsubscribe linux-nfs" in the body of a message to majordomo-u79uwXL29TY76Z2rM5mHXA@public.gmane.org More majordomo info at http://vger.kernel.org/majordomo-info.html