First published: Wed Sep 14 2011(Updated: )
Currently, we skip doing the is_path_accessible check in cifs_mount if there is no prefixpath. There is a report of at least one server however that allows a TREE_CONNECT to a share that has a DFS referral at its root. UNC that had no prefixpath was used in that case, so the is_path_accessible check was not triggered and the box later hit a BUG() because we were chasing a DFS referral on the root dentry for the mount. Upstream fix: 70945643722ffeac779d2529a348f99567fa5c33 References: <a class="bz_bug_link bz_status_CLOSED bz_closed bz_public " title="CLOSED UPSTREAM - mounting of DFS share causes kernel oops" href="show_bug.cgi?id=682829">https://bugzilla.redhat.com/show_bug.cgi?id=682829</a> <a href="https://github.com/torvalds/linux/commit/70945643722ffeac779d2529a348f99567fa5c33">https://github.com/torvalds/linux/commit/70945643722ffeac779d2529a348f99567fa5c33</a> Acknowledgements: Red Hat would like to thank Yogesh Sharma for reporting this issue.
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Linux |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-738291 is considered medium due to potential unauthorized access to shares.
To fix REDHAT-BUG-738291, apply the latest updates for the Red Hat Linux Kernel that address this vulnerability.
REDHAT-BUG-738291 affects systems running Red Hat Linux Kernel without prefixpath checks implemented in cifs_mount.
The potential risks associated with REDHAT-BUG-738291 include unauthorized access to network shares via DFS referrals.
Yes, a patch has been released to address the issues outlined in REDHAT-BUG-738291, and users are encouraged to apply it.