First published: Wed Sep 14 2011(Updated: )
Currently, we skip doing the is_path_accessible check in cifs_mount if there is no prefixpath. There is a report of at least one server however that allows a TREE_CONNECT to a share that has a DFS referral at its root. UNC that had no prefixpath was used in that case, so the is_path_accessible check was not triggered and the box later hit a BUG() because we were chasing a DFS referral on the root dentry for the mount. Upstream fix: 70945643722ffeac779d2529a348f99567fa5c33 References: <a class="bz_bug_link bz_status_CLOSED bz_closed bz_public " title="CLOSED UPSTREAM - mounting of DFS share causes kernel oops" href="show_bug.cgi?id=682829">https://bugzilla.redhat.com/show_bug.cgi?id=682829</a> <a href="https://github.com/torvalds/linux/commit/70945643722ffeac779d2529a348f99567fa5c33">https://github.com/torvalds/linux/commit/70945643722ffeac779d2529a348f99567fa5c33</a> Acknowledgements: Red Hat would like to thank Yogesh Sharma for reporting this issue.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/linux-2.6 | ||
Linux kernel | <2.6.39 | |
Red Hat Enterprise Linux | =4.0 | |
<2.6.39 | ||
=4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-3363 has a medium severity level due to potential unauthorized access through the DFS referral.
To fix CVE-2011-3363, update to an unaffected version of the Linux kernel or apply the relevant patches addressing this vulnerability.
CVE-2011-3363 affects Linux kernel versions up to 2.6.39 and Red Hat Enterprise Linux 4.0.
CVE-2011-3363 exploits a flaw in the CIFS implementation in the Linux kernel that skips access checks under certain conditions.
Yes, CVE-2011-3363 has been publicly disclosed and discussed in security forums and documentation.