oss-sec mailing list archives

CVE request: kernel: tomoyo: oops in tomoyo_mount_acl()


From: Petr Matousek <pmatouse () redhat com>
Date: Thu, 30 Jun 2011 12:13:01 +0200

Description of problem:
In tomoyo_mount_acl() since 2.6.36, kern_path() was called without
checking dev_name != NULL. As a result, an unprivileged user can
trigger oops by issuing mount(NULL, "/", "ext3", 0, NULL) request.

Upstream fix:
4e78c724d47e2342aa8fde61f6b8536f662f795f

Thanks,
-- 
Petr Matousek / Red Hat Security Response Team


Current thread: