summaryrefslogtreecommitdiffstats
path: root/retired/CVE-2006-3468
diff options
context:
space:
mode:
authorMoritz Muehlenhoff <jmm@debian.org>2008-04-04 08:22:59 +0000
committerMoritz Muehlenhoff <jmm@debian.org>2008-04-04 08:22:59 +0000
commite824eab7fea625551e3ee27c390cf894cfbfba04 (patch)
tree239de3139175e9b98d4e2a45e1962aa10beb2e92 /retired/CVE-2006-3468
parent60ddf7542af3875373d9827c167f1d51926a8f6d (diff)
retire some issues now that Sarge support has ended
git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@1154 e094ebfe-e918-0410-adfb-c712417f3574
Diffstat (limited to 'retired/CVE-2006-3468')
-rw-r--r--retired/CVE-2006-346831
1 files changed, 31 insertions, 0 deletions
diff --git a/retired/CVE-2006-3468 b/retired/CVE-2006-3468
new file mode 100644
index 00000000..380b97b0
--- /dev/null
+++ b/retired/CVE-2006-3468
@@ -0,0 +1,31 @@
+Candidate: CVE-2006-3468
+References:
+ http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=2ccb48ebb4de139eef4fcefd5f2bb823cb0d81b9
+Description:
+ Linux kernel 2.6.x, when using both NFS and EXT3, allows remote
+ attackers to cause a denial of service (file system panic) via a
+ crafted UDP packet with a V2 lookup procedure that specifies a bad
+ file handle (inode number), which triggers an error and causes an
+ exported directory to be remounted read-only.
+Ubuntu-Description:
+ James McKenzie discovered a Denial of Service vulnerability in the
+ NFS driver. When exporting an ext3 file system over NFS, a remote
+ attacker could exploit this to trigger a file system panic by sending
+ a specially crafted UDP packet.
+Notes:
+ http://lkml.org/lkml/2006/7/20/1: proposed patch
+ unclear whether 2.4 is affected
+ dannf> Submitted to Adrian Bunk for inclusion in 2.6.16.x
+ dannf> ignoring 2.4 till a fix goes upstream
+Bugs:
+ https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=199172
+upstream: released (2.6.17.8, 2.6.18-rc4)
+linux-2.6: released (2.6.18-1)
+2.6.8-sarge-security: released (2.6.8-16sarge5) [fs-ext3-bad-nfs-handle.dpatch]
+2.4.27-sarge-security: ignored (2.4.27-10sarge4)
+2.6.10-hoary-security: released (2.6.10-34.23)
+2.6.12-breezy-security: released (2.6.12-10.37)
+2.6.15-dapper-security: released (2.6.15-26.47)
+2.6.17-edgy: released (2.6.17-10.30)
+2.6.18-etch-security: N/A
+

© 2014-2024 Faster IT GmbH | imprint | privacy policy