[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248364

 
 

909

 
 

195388

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2011-2518Date: (C)2012-05-24   (M)2024-02-22


The tomoyo_mount_acl function in security/tomoyo/mount.c in the Linux kernel before 2.6.39.2 calls the kern_path function with arguments taken directly from a mount system call, which allows local users to cause a denial of service (OOPS) or possibly have unspecified other impact via a NULL value for the device name.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 4.9
Exploit Score: 3.9
Impact Score: 6.9
 
CVSS V2 Metrics:
Access Vector: LOCAL
Access Complexity: LOW
Authentication: NONE
Confidentiality: NONE
Integrity: NONE
Availability: COMPLETE
  
Reference:
HPSBGN02970
http://www.openwall.com/lists/oss-security/2011/07/01/5
http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39.2
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=4e78c724d47e2342aa8fde61f6b8536f662f795f
https://github.com/torvalds/linux/commit/4e78c724d47e2342aa8fde61f6b8536f662f795f

CWE    1
CWE-20
OVAL    3
oval:org.secpod.oval:def:700785
oval:org.secpod.oval:def:700794
oval:org.secpod.oval:def:700791

© SecPod Technologies