First published: Tue Oct 02 2007(Updated: )
Due issue described in <a class="bz_bug_link bz_status_CLOSED bz_closed bz_public " title="CLOSED DUPLICATE - O_ATOMICLOOKUP vs O_CLOEXEC(mainstream kernels) incompatibility" href="show_bug.cgi?id=313681">https://bugzilla.redhat.com/show_bug.cgi?id=313681</a> open(O_ATOMICLOOKUP) leaks the dentry on the filesystems where d_revalidate is implemented. i.e open ("/proc/self/exe", O_RDONLY); open ("/proc/self/exe", O_RDONLY | 02000000); leaks one dentry. By this way it's possible to eat all the memory on the node or overflow dentry->d_count. Both RHEL4 and RHEL5 kernels are vulnerabled Acknowledgements: Red Hat would like to credit Vasily Averin for reporting this issue.
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Linux | >=4<=5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-315051 is classified as medium.
Fixing REDHAT-BUG-315051 involves updating the Red Hat Linux Kernel to a version later than 5.
Red Hat Linux Kernel versions between 4 and 5 are affected by REDHAT-BUG-315051.
A temporary workaround for REDHAT-BUG-315051 may include disabling the use of O_ATOMICLOOKUP.
REDHAT-BUG-315051 is classified as an incompatibility issue between O_ATOMICLOOKUP and O_CLOEXEC.