Hi, On 6/22/07, Arnd Bergmann <arnd@xxxxxxxx> wrote:
On Thursday 21 June 2007, Carsten Otte wrote: > > This is an updated version of my bugfix patch. Yan Zheng pointed out, > that ext2_remount lacks checking if -o xip should be enabled or not. > This patch checks for presence of direct_access on the backing block > device and if the blocksize meets the requirements. > Andrew, please consider adding this patch to -mm. > > Signed-off-by: Carsten Otte <cotte@xxxxxxxxxx> It looks to me like a local denial of service attack in case of user-mountable ext2 file systems in /etc/fstab. Shouldn't that make it go into 2.6.22?
I agree. I would go on to suggest that all trivially-triggered oopsen / panics from userspace (even if they require privileges, such as the cat /dev/snapshot == oops issue posted last week) in fact ought to be CVE's, and the corresponding fixes for such issues be considered as candidates for -stable, if applicable to the current stable kernel. Satyam - To unsubscribe from this list: send the line "unsubscribe linux-fsdevel" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html