Описание
The tomoyo_mount_acl function in security/tomoyo/mount.c in the Linux kernel before 2.6.39.2 calls the kern_path function with arguments taken directly from a mount system call, which allows local users to cause a denial of service (OOPS) or possibly have unspecified other impact via a NULL value for the device name.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | not-affected | 3.1.0-1.0 |
| esm-infra-legacy/trusty | not-affected | 3.11.0-12.19 |
| hardy | not-affected | |
| lucid | not-affected | |
| maverick | not-affected | |
| natty | released | 2.6.38-13.56 |
| oneiric | not-affected | 3.0-2.3 |
| precise | not-affected | 3.1.0-1.1 |
| quantal | not-affected | |
| saucy | not-affected |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| devel | DNE | |
| esm-infra-legacy/trusty | DNE | |
| hardy | DNE | |
| lucid | DNE | |
| natty | DNE | |
| oneiric | DNE | |
| precise | not-affected | 3.2.0-1600.1 |
| quantal | not-affected | |
| saucy | DNE | |
| trusty | DNE |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| devel | DNE | |
| esm-infra-legacy/trusty | DNE | |
| hardy | DNE | |
| lucid | not-affected | |
| maverick | ignored | end of life |
| natty | DNE | |
| oneiric | DNE | |
| precise | DNE | |
| quantal | DNE | |
| saucy | DNE |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| devel | not-affected | 3.4.0-1.3 |
| esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was not-affected [3.4.0-1.3]] |
| lucid | DNE | |
| precise | DNE | |
| quantal | DNE | |
| saucy | DNE | |
| trusty | not-affected | 3.4.0-1.3 |
| trusty/esm | DNE | trusty was not-affected [3.4.0-1.3] |
| upstream | released | 3.0~rc4 |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| devel | DNE | |
| esm-infra-legacy/trusty | DNE | |
| hardy | DNE | |
| lucid | not-affected | |
| maverick | DNE | |
| natty | DNE | |
| oneiric | DNE | |
| precise | DNE | |
| quantal | DNE | |
| saucy | DNE |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| devel | not-affected | 3.4.0-1.7 |
| esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was not-affected [3.4.0-1.7]] |
| lucid | DNE | |
| precise | DNE | |
| quantal | DNE | |
| saucy | ignored | |
| trusty | not-affected | 3.4.0-1.7 |
| trusty/esm | DNE | trusty was not-affected [3.4.0-1.7] |
| upstream | released | 3.0~rc4 |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| devel | not-affected | 3.1.10-8.28 |
| esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was not-affected [3.1.10-8.28]] |
| lucid | DNE | |
| precise | DNE | |
| quantal | DNE | |
| saucy | ignored | |
| trusty | not-affected | 3.1.10-8.28 |
| trusty/esm | DNE | trusty was not-affected [3.1.10-8.28] |
| upstream | released | 3.0~rc4 |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| devel | DNE | |
| esm-infra-legacy/trusty | DNE | |
| hardy | DNE | |
| lucid | not-affected | |
| maverick | DNE | |
| natty | DNE | |
| oneiric | DNE | |
| precise | DNE | |
| quantal | DNE | |
| saucy | DNE |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| devel | DNE | |
| esm-infra-legacy/trusty | DNE | |
| hardy | DNE | |
| lucid | released | 2.6.38-13.56~lucid1 |
| maverick | DNE | |
| natty | DNE | |
| oneiric | DNE | |
| precise | DNE | |
| quantal | DNE | |
| saucy | DNE |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| devel | DNE | |
| esm-infra-legacy/trusty | DNE | |
| hardy | DNE | |
| lucid | not-affected | 3.0.0-5.6~lucid1 |
| maverick | DNE | |
| natty | DNE | |
| oneiric | DNE | |
| precise | DNE | |
| quantal | DNE | |
| saucy | DNE |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| devel | not-affected | 3.0.0-3.18 |
| esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was not-affected [3.0.0-3.18]] |
| lucid | DNE | |
| precise | DNE | |
| quantal | DNE | |
| saucy | ignored | |
| trusty | not-affected | 3.0.0-3.18 |
| trusty/esm | DNE | trusty was not-affected [3.0.0-3.18] |
| upstream | released | 3.0~rc4 |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| devel | not-affected | 3.4.0-3.21 |
| esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was not-affected [3.4.0-3.21]] |
| lucid | DNE | |
| precise | DNE | |
| quantal | DNE | |
| saucy | ignored | |
| trusty | not-affected | 3.4.0-3.21 |
| trusty/esm | DNE | trusty was not-affected [3.4.0-3.21] |
| upstream | released | 3.0~rc4 |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| devel | not-affected | 3.4.0-4.19 |
| esm-infra-legacy/trusty | DNE | trusty/esm was DNE [trusty was not-affected [3.4.0-4.19]] |
| lucid | DNE | |
| precise | DNE | |
| quantal | DNE | |
| saucy | ignored | |
| trusty | not-affected | 3.4.0-4.19 |
| trusty/esm | DNE | trusty was not-affected [3.4.0-4.19] |
| upstream | released | 3.0~rc4 |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| devel | DNE | |
| esm-infra-legacy/trusty | DNE | |
| hardy | DNE | |
| lucid | ignored | end of life |
| maverick | not-affected | |
| natty | DNE | |
| oneiric | DNE | |
| precise | DNE | |
| quantal | DNE | |
| saucy | DNE |
Показывать по
| Релиз | Статус | Примечание |
|---|---|---|
| devel | DNE | |
| esm-infra-legacy/trusty | DNE | |
| hardy | DNE | |
| lucid | DNE | |
| maverick | not-affected | |
| natty | released | 2.6.38-1209.22 |
| oneiric | not-affected | 3.0.0-1200.1 |
| precise | not-affected | 3.0.0-1401.2 |
| quantal | not-affected | |
| saucy | not-affected |
Показывать по
EPSS
4.9 Medium
CVSS2
Связанные уязвимости
The tomoyo_mount_acl function in security/tomoyo/mount.c in the Linux kernel before 2.6.39.2 calls the kern_path function with arguments taken directly from a mount system call, which allows local users to cause a denial of service (OOPS) or possibly have unspecified other impact via a NULL value for the device name.
The tomoyo_mount_acl function in security/tomoyo/mount.c in the Linux ...
The tomoyo_mount_acl function in security/tomoyo/mount.c in the Linux kernel before 2.6.39.2 calls the kern_path function with arguments taken directly from a mount system call, which allows local users to cause a denial of service (OOPS) or possibly have unspecified other impact via a NULL value for the device name.
EPSS
4.9 Medium
CVSS2