Oval Definition:oval:com.ubuntu.trusty:def:20112518000
Revision Date:2012-05-24Version:1
Title:CVE-2011-2518 on Ubuntu 14.04 LTS (trusty) - low.
Description:The tomoyo_mount_acl function in security/tomoyo/mount.c in the Linux kernel before 2.6.39.2 calls the kern_path function with arguments taken directly from a mount system call, which allows local users to cause a denial of service (OOPS) or possibly have unspecified other impact via a NULL value for the device name. A flaw was discovered in the TOMOYO LSM's handling of mount system calls. An unprivileged user could oops the system causing a denial of service.
Family:unixClass:vulnerability
Status:Reference(s):CVE-2011-2518
Platform(s):Ubuntu 14.04 LTS
Product(s):
Definition Synopsis
  • Ubuntu 14.04 LTS (trusty) is installed.
  • AND Package Information
  • NOT While related to the CVE in some way, the 'linux' package in trusty is not affected (note: '3.11.0-12.19').
  • OR NOT While related to the CVE in some way, the 'linux-flo' package in trusty is not affected (note: '3.4.0-1.3').
  • OR NOT While related to the CVE in some way, the 'linux-goldfish' package in trusty is not affected (note: '3.4.0-1.7').
  • OR NOT While related to the CVE in some way, the 'linux-grouper' package in trusty is not affected (note: '3.1.10-8.28').
  • OR NOT While related to the CVE in some way, the 'linux-maguro' package in trusty is not affected (note: '3.0.0-3.18').
  • OR NOT While related to the CVE in some way, the 'linux-mako' package in trusty is not affected (note: '3.4.0-3.21').
  • OR NOT While related to the CVE in some way, the 'linux-manta' package in trusty is not affected (note: '3.4.0-4.19').
  • BACK