summaryrefslogtreecommitdiffstats
path: root/retired/CVE-2006-5823
diff options
context:
space:
mode:
authorMoritz Muehlenhoff <jmm@debian.org>2008-02-22 22:05:22 +0000
committerMoritz Muehlenhoff <jmm@debian.org>2008-02-22 22:05:22 +0000
commitf0b3303c9a82b65f78e929e08389b1ec88034e2b (patch)
treed3401bc2bcec5f5214c7dfc50853885b04a5e1f1 /retired/CVE-2006-5823
parent1350e67a7134d8b304a4c0b1d093693a02b0030a (diff)
retire more issues
git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@1142 e094ebfe-e918-0410-adfb-c712417f3574
Diffstat (limited to 'retired/CVE-2006-5823')
-rw-r--r--retired/CVE-2006-582326
1 files changed, 26 insertions, 0 deletions
diff --git a/retired/CVE-2006-5823 b/retired/CVE-2006-5823
new file mode 100644
index 00000000..551302d9
--- /dev/null
+++ b/retired/CVE-2006-5823
@@ -0,0 +1,26 @@
+Candidate: CVE-2006-5823
+References:
+ http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=8bb0269160df2a60764013994d0bc5165406cf4a
+ MISC:http://projects.info-pull.com/mokb/MOKB-07-11-2006.html
+ SECUNIA:22767
+ URL:http://secunia.com/advisories/22767
+Description:
+ The zlib_inflate function in Linux kernel 2.6.x allows local users to cause a
+ denial of service (crash) via a malformed filesystem that uses zlib
+ compression that triggers memory corruption, as demonstrated using cramfs.
+Ubuntu-Description:
+ A buffer overread was found in the zlib_inflate() function. By
+ tricking an user into mounting a specially crafted file system which
+ uses zlib compression (such as cramfs), this could be exploited to
+ crash the kernel.
+Notes:
+ dannf> This is reproducible in 2.4.27
+Bugs:
+upstream: released (2.4.36-pre2, 2.6.20-rc1)
+linux-2.6: released (2.6.20-1)
+2.6.18-etch-security: released (2.6.18.dfsg.1-10)
+2.6.8-sarge-security: released (2.6.8-17sarge1) [cramfs-check-block-length.dpatch]
+2.4.27-sarge-security: released (2.4.27-10sarge6) [254_cramfs-check-block-length.diff]
+2.6.12-breezy-security: released (2.6.12-10.43)
+2.6.15-dapper-security: released (2.6.15-28.51)
+2.6.17-edgy-security: released (2.6.17.1-11.35)

© 2014-2024 Faster IT GmbH | imprint | privacy policy