Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Fri, 01 Jul 2011 17:00:42 +0800
From: Eugene Teo <eugene@...hat.com>
To: oss-security@...ts.openwall.com,
        "Steven M. Christey" <coley@...us.mitre.org>
Subject: Re: CVE request: kernel: tomoyo: oops in tomoyo_mount_acl()

On 06/30/2011 06:13 PM, Petr Matousek wrote:
> Description of problem:
> In tomoyo_mount_acl() since 2.6.36, kern_path() was called without
> checking dev_name != NULL. As a result, an unprivileged user can
> trigger oops by issuing mount(NULL, "/", "ext3", 0, NULL) request.
> 
> Upstream fix:
> 4e78c724d47e2342aa8fde61f6b8536f662f795f

Use CVE-2011-2518.

Eugene

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.