We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
In the Linux kernel, the following vulnerability has been resolved: __legitimize_mnt(): check for MNT_SYNC_UMOUNT should be under mount_lock ... or we risk stealing final mntput from sync umount - raising mnt_count after umount(2) has verified that victim is not busy, but before it has set MNT_SYNC_UMOUNT; in that case __legitimize_mnt() doesn't see that it's safe to quietly undo mnt_count increment and leaves dropping the reference to caller, where it'll be a full-blown mntput(). Check under mount_lock is needed; leaving the current one done before taking that makes no sense - it's nowhere near common enough to bother with.
Reserved 2025-04-16 | Published 2025-06-18 | Updated 2025-06-18 | Assigner Linuxgit.kernel.org/...c/628fb00195ce21a90cf9e4e3d105cd9e58f77b40
git.kernel.org/...c/b89eb56a378b7b2c1176787fc228d0a57172bdd5
git.kernel.org/...c/f6d45fd92f62845cbd1eb5128fd8f0ed7d0c5a42
git.kernel.org/...c/9b0915e72b3cf52474dcee0b24a2f99d93e604a3
git.kernel.org/...c/d8ece4ced3b051e656c77180df2e69e19e24edc1
git.kernel.org/...c/8cafd7266fa02e0863bacbf872fe635c0b9725eb
git.kernel.org/...c/b55996939c71a3e1a38f3cdc6a8859797efc9083
git.kernel.org/...c/250cf3693060a5f803c5f1ddc082bb06b16112a9
Support options