summaryrefslogtreecommitdiffstats
path: root/retired/CVE-2006-6056
diff options
context:
space:
mode:
authorMoritz Muehlenhoff <jmm@debian.org>2007-06-18 21:03:46 +0000
committerMoritz Muehlenhoff <jmm@debian.org>2007-06-18 21:03:46 +0000
commitd039df62c5cb4db0180509865c33d688aa093e63 (patch)
tree82e6de7a8b061b621f4b6ee80261b052c0292d9f /retired/CVE-2006-6056
parent097e6e4f41a181ed32c42324fd51fc8d5854942e (diff)
retire some issues now resolved with the latest 2.6.8 DSA
git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@860 e094ebfe-e918-0410-adfb-c712417f3574
Diffstat (limited to 'retired/CVE-2006-6056')
-rw-r--r--retired/CVE-2006-605626
1 files changed, 26 insertions, 0 deletions
diff --git a/retired/CVE-2006-6056 b/retired/CVE-2006-6056
new file mode 100644
index 00000000..5755c5c4
--- /dev/null
+++ b/retired/CVE-2006-6056
@@ -0,0 +1,26 @@
+Candidate: CVE-2006-6056
+References:
+ http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=d6ddf55440833fd9404138026af246c51ebeef22
+ MISC:http://projects.info-pull.com/mokb/MOKB-14-11-2006.html
+Description:
+ Linux kernel 2.6.x up to 2.6.18 and possibly other versions, when SELinux
+ hooks are enabled, allows local users to cause a denial of service (crash)
+ via a malformed file stream that triggers a NULL pointer dereference in the
+ superblock_doinit function, as demonstrated using an HFS filesystem image.
+Ubuntu-Description:
+ The hfs file system driver did not properly handle corrupted data
+ structures. By mounting a specially crafted hfs file system, a local
+ attacker could exploit this to crash the kernel. This only affects
+ systems which enable SELinux (Ubuntu disables SELinux by default).
+Notes:
+ dannf> Though this bug fix applies to 2.4, 2.4 does not include SELinux
+ so it should not be vulnerable to the DoS
+Bugs:
+upstream: released (2.6.19)
+linux-2.6: released (2.6.18.dfsg.1-10)
+2.6.18-etch-security: released (2.6.18.dfsg.1-10) [bugfix/2.6.16.38]
+2.6.8-sarge-security: released (2.6.8-16sarge7) [hfs-no-root-inode.dpatch]
+2.4.27-sarge-security: N/A
+2.6.12-breezy-security: released (2.6.12-10.43)
+2.6.15-dapper-security: released (2.6.15-28.51)
+2.6.17-edgy-security: released (2.6.17.1-11.35)

© 2014-2024 Faster IT GmbH | imprint | privacy policy