Upstream information

CVE-2011-2518 at MITRE


The tomoyo_mount_acl function in security/tomoyo/mount.c in the Linux kernel before calls the kern_path function with arguments taken directly from a mount system call, which allows local users to cause a denial of service (OOPS) or possibly have unspecified other impact via a NULL value for the device name.

SUSE information

Overall state of this security issue: Resolved

This issue is currently rated as having moderate severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 4.9
Vector AV:L/AC:L/Au:N/C:N/I:N/A:C
Access Vector Local
Access Complexity Low
Authentication None
Confidentiality Impact None
Integrity Impact None
Availability Impact Complete

Note from the SUSE Security Team

Tomoyo was not shipped in SUSE Linux Enterprise Server 11 SP2 or older products, so they are not affected by this issue.

SUSE Bugzilla entry: 703158 [RESOLVED / UPSTREAM]

No SUSE Security Announcements cross referenced.