diff options
author | Moritz Muehlenhoff <jmm@debian.org> | 2008-02-22 21:53:05 +0000 |
---|---|---|
committer | Moritz Muehlenhoff <jmm@debian.org> | 2008-02-22 21:53:05 +0000 |
commit | 0394957db79db8afcae11908388c24464b8d744f (patch) | |
tree | 8f82b84cda898d89f438bc4c4e7b00e8d0324b60 /retired/CVE-2006-6053 | |
parent | 60e5f903d389fc77fb16d492f07f52e65c20be16 (diff) |
retire some issues
git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@1140 e094ebfe-e918-0410-adfb-c712417f3574
Diffstat (limited to 'retired/CVE-2006-6053')
-rw-r--r-- | retired/CVE-2006-6053 | 22 |
1 files changed, 22 insertions, 0 deletions
diff --git a/retired/CVE-2006-6053 b/retired/CVE-2006-6053 new file mode 100644 index 00000000..25356db5 --- /dev/null +++ b/retired/CVE-2006-6053 @@ -0,0 +1,22 @@ +Candidate: CVE-2006-6053 +References: + http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=40b851348fe9bf49c26025b34261d25142269b60 + MISC:http://projects.info-pull.com/mokb/MOKB-10-11-2006.html +Description: + The ext3fs_dirhash function in Linux kernel 2.6.x allows local users to cause + a denial of service (crash) via an ext3 stream with malformed data structures. +Ubuntu-Description: + The ext3 file system driver did not properly handle corrupted data + structures. By mounting a specially crafted ext3 file system, a local + attacker could exploit this to crash the kernel. +Notes: + dannf> only the dir.c bit applies to 2.4 +Bugs: +upstream: released (2.6.20-rc5) +linux-2.6: released (2.6.20-1) +2.6.18-etch-security: released (2.6.18.dfsg.1-10) [bugfix/2.6.16.38] +2.6.8-sarge-security: released (2.6.8-16sarge7) [ext3-fsfuzz.dpatch] +2.4.27-sarge-security: released (2.4.27-10sarge6) [242_ext3-fsfuzz.diff] +2.6.12-breezy-security: released (2.6.12-10.43) +2.6.15-dapper-security: released (2.6.15-28.51) +2.6.17-edgy-security: released (2.6.17.1-11.35) |