CVE-2011-2518
HP Security Bulletin HPSBGN02970
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
The tomoyo_mount_acl function in security/tomoyo/mount.c in the Linux kernel before 2.6.39.2 calls the kern_path function with arguments taken directly from a mount system call, which allows local users to cause a denial of service (OOPS) or possibly have unspecified other impact via a NULL value for the device name.
La función tomoyo_mount_acl de security/tomoyo/mount.c en el kernel de Linux antes de v2.6.39.2 llama a la función kern_path con argumentos tomados directamente de una llamada al sistema de montaje, lo que permite a usuarios locales provocar una denegación de servicio (OOPS) o posiblemente tener otro impacto no especificado a través de un valor NULL para el nombre del dispositivo.
The linux kernel did not properly account for PTE pages when deciding which task to kill in out of memory conditions. A local, unprivileged could exploit this flaw to cause a denial of service. A flaw was discovered in the TOMOYO LSM's handling of mount system calls. An unprivileged user could oops the system causing a denial of service. A bug was discovered in the Linux kernel's calculation of OOM (Out of memory) scores, that would result in the wrong process being killed. A user could use this to kill the process with the highest OOM score, even if that process belongs to another user or the system. Various other issues were also addressed.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2011-06-15 CVE Reserved
- 2012-02-29 CVE Published
- 2024-08-06 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-20: Improper Input Validation
CAPEC
References (5)
URL | Tag | Source |
---|---|---|
http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.39.2 | Broken Link | |
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=4e78c724d47e2342aa8fde61f6b8536f662f795f | X_refsource_confirm | |
http://www.openwall.com/lists/oss-security/2011/07/01/5 | Mailing List |
|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://github.com/torvalds/linux/commit/4e78c724d47e2342aa8fde61f6b8536f662f795f | 2023-02-13 |
URL | Date | SRC |
---|---|---|
http://marc.info/?l=bugtraq&m=139447903326211&w=2 | 2023-02-13 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | < 2.6.39.2 Search vendor "Linux" for product "Linux Kernel" and version " < 2.6.39.2" | - |
Affected
|