[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Thu, 30 Jun 2011 12:13:01 +0200
From: Petr Matousek <pmatouse@...hat.com>
To: oss-security@...ts.openwall.com
Cc: "Steven M. Christey" <coley@...us.mitre.org>
Subject: CVE request: kernel: tomoyo: oops in tomoyo_mount_acl()
Description of problem:
In tomoyo_mount_acl() since 2.6.36, kern_path() was called without
checking dev_name != NULL. As a result, an unprivileged user can
trigger oops by issuing mount(NULL, "/", "ext3", 0, NULL) request.
Upstream fix:
4e78c724d47e2342aa8fde61f6b8536f662f795f
Thanks,
--
Petr Matousek / Red Hat Security Response Team
Powered by blists - more mailing lists
Please check out the
Open Source Software Security Wiki, which is counterpart to this
mailing list.
Powered by Openwall GNU/*/Linux -
Powered by OpenVZ