|
Message-ID: <4E0D8CBA.8050309@redhat.com> Date: Fri, 01 Jul 2011 17:00:42 +0800 From: Eugene Teo <eugene@...hat.com> To: oss-security@...ts.openwall.com, "Steven M. Christey" <coley@...us.mitre.org> Subject: Re: CVE request: kernel: tomoyo: oops in tomoyo_mount_acl() On 06/30/2011 06:13 PM, Petr Matousek wrote: > Description of problem: > In tomoyo_mount_acl() since 2.6.36, kern_path() was called without > checking dev_name != NULL. As a result, an unprivileged user can > trigger oops by issuing mount(NULL, "/", "ext3", 0, NULL) request. > > Upstream fix: > 4e78c724d47e2342aa8fde61f6b8536f662f795f Use CVE-2011-2518. Eugene
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.