Логотип exploitDog
bind:CVE-2011-2518
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2011-2518

Количество 4

Количество 4

ubuntu логотип

CVE-2011-2518

больше 13 лет назад

The tomoyo_mount_acl function in security/tomoyo/mount.c in the Linux kernel before 2.6.39.2 calls the kern_path function with arguments taken directly from a mount system call, which allows local users to cause a denial of service (OOPS) or possibly have unspecified other impact via a NULL value for the device name.

CVSS2: 4.9
EPSS: Низкий
nvd логотип

CVE-2011-2518

больше 13 лет назад

The tomoyo_mount_acl function in security/tomoyo/mount.c in the Linux kernel before 2.6.39.2 calls the kern_path function with arguments taken directly from a mount system call, which allows local users to cause a denial of service (OOPS) or possibly have unspecified other impact via a NULL value for the device name.

CVSS2: 4.9
EPSS: Низкий
debian логотип

CVE-2011-2518

больше 13 лет назад

The tomoyo_mount_acl function in security/tomoyo/mount.c in the Linux ...

CVSS2: 4.9
EPSS: Низкий
github логотип

GHSA-vqf6-mcj4-prjh

больше 3 лет назад

The tomoyo_mount_acl function in security/tomoyo/mount.c in the Linux kernel before 2.6.39.2 calls the kern_path function with arguments taken directly from a mount system call, which allows local users to cause a denial of service (OOPS) or possibly have unspecified other impact via a NULL value for the device name.

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2011-2518

The tomoyo_mount_acl function in security/tomoyo/mount.c in the Linux kernel before 2.6.39.2 calls the kern_path function with arguments taken directly from a mount system call, which allows local users to cause a denial of service (OOPS) or possibly have unspecified other impact via a NULL value for the device name.

CVSS2: 4.9
0%
Низкий
больше 13 лет назад
nvd логотип
CVE-2011-2518

The tomoyo_mount_acl function in security/tomoyo/mount.c in the Linux kernel before 2.6.39.2 calls the kern_path function with arguments taken directly from a mount system call, which allows local users to cause a denial of service (OOPS) or possibly have unspecified other impact via a NULL value for the device name.

CVSS2: 4.9
0%
Низкий
больше 13 лет назад
debian логотип
CVE-2011-2518

The tomoyo_mount_acl function in security/tomoyo/mount.c in the Linux ...

CVSS2: 4.9
0%
Низкий
больше 13 лет назад
github логотип
GHSA-vqf6-mcj4-prjh

The tomoyo_mount_acl function in security/tomoyo/mount.c in the Linux kernel before 2.6.39.2 calls the kern_path function with arguments taken directly from a mount system call, which allows local users to cause a denial of service (OOPS) or possibly have unspecified other impact via a NULL value for the device name.

0%
Низкий
больше 3 лет назад

Уязвимостей на страницу