summaryrefslogtreecommitdiffstats
path: root/retired/CVE-2006-6053
diff options
context:
space:
mode:
authorMoritz Muehlenhoff <jmm@debian.org>2008-02-22 21:53:05 +0000
committerMoritz Muehlenhoff <jmm@debian.org>2008-02-22 21:53:05 +0000
commit0394957db79db8afcae11908388c24464b8d744f (patch)
tree8f82b84cda898d89f438bc4c4e7b00e8d0324b60 /retired/CVE-2006-6053
parent60e5f903d389fc77fb16d492f07f52e65c20be16 (diff)
retire some issues
git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@1140 e094ebfe-e918-0410-adfb-c712417f3574
Diffstat (limited to 'retired/CVE-2006-6053')
-rw-r--r--retired/CVE-2006-605322
1 files changed, 22 insertions, 0 deletions
diff --git a/retired/CVE-2006-6053 b/retired/CVE-2006-6053
new file mode 100644
index 00000000..25356db5
--- /dev/null
+++ b/retired/CVE-2006-6053
@@ -0,0 +1,22 @@
+Candidate: CVE-2006-6053
+References:
+ http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=40b851348fe9bf49c26025b34261d25142269b60
+ MISC:http://projects.info-pull.com/mokb/MOKB-10-11-2006.html
+Description:
+ The ext3fs_dirhash function in Linux kernel 2.6.x allows local users to cause
+ a denial of service (crash) via an ext3 stream with malformed data structures.
+Ubuntu-Description:
+ The ext3 file system driver did not properly handle corrupted data
+ structures. By mounting a specially crafted ext3 file system, a local
+ attacker could exploit this to crash the kernel.
+Notes:
+ dannf> only the dir.c bit applies to 2.4
+Bugs:
+upstream: released (2.6.20-rc5)
+linux-2.6: released (2.6.20-1)
+2.6.18-etch-security: released (2.6.18.dfsg.1-10) [bugfix/2.6.16.38]
+2.6.8-sarge-security: released (2.6.8-16sarge7) [ext3-fsfuzz.dpatch]
+2.4.27-sarge-security: released (2.4.27-10sarge6) [242_ext3-fsfuzz.diff]
+2.6.12-breezy-security: released (2.6.12-10.43)
+2.6.15-dapper-security: released (2.6.15-28.51)
+2.6.17-edgy-security: released (2.6.17.1-11.35)

© 2014-2024 Faster IT GmbH | imprint | privacy policy