diff options
author | dann frazier <dannf@debian.org> | 2008-01-22 16:14:23 +0000 |
---|---|---|
committer | dann frazier <dannf@debian.org> | 2008-01-22 16:14:23 +0000 |
commit | ce520f68ab23c967cccb1b3abc379d4431d8e54d (patch) | |
tree | 2d81337266997d36c36c85332a99321db9129216 /retired/CVE-2006-6128 | |
parent | 5096372f90f718e7278b7ba8d50dde3fdf8cf651 (diff) |
retire CVE-2006-6128
git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@1109 e094ebfe-e918-0410-adfb-c712417f3574
Diffstat (limited to 'retired/CVE-2006-6128')
-rw-r--r-- | retired/CVE-2006-6128 | 30 |
1 files changed, 30 insertions, 0 deletions
diff --git a/retired/CVE-2006-6128 b/retired/CVE-2006-6128 new file mode 100644 index 00000000..63748199 --- /dev/null +++ b/retired/CVE-2006-6128 @@ -0,0 +1,30 @@ +Candidate: CVE-2006-6128 +References: + MISC:http://projects.info-pull.com/mokb/MOKB-25-11-2006.html + FRSIRT:ADV-2006-4716 + URL:http://www.frsirt.com/english/advisories/2006/4716 + SECUNIA:23093 + URL:http://secunia.com/advisories/23093 + XF:linux-reiserfs-dos(30551) + URL:http://xforce.iss.net/xforce/xfdb/30551 +Description: + The ReiserFS functionality in Linux kernel 2.6.18, and possibly other + versions, allows local users to cause a denial of service via a malformed + ReiserFS file system that triggers memory corruption when a sync is performed. +Ubuntu-Description: +Notes: + dannf> low impact; no known upstream fix + jmm> ignored, only exploitable with manipulated fs images, for which mount + jmm> privs are needed + dannf> https://bugzilla.redhat.com/show_bug.cgi?id=250625 suggests this + maybe fedora-specific. Indeed, I cannot reproduce w/ the MOKB fs + any of the Debian kernels +Bugs: +upstream: N/A +linux-2.6: N/A +2.6.18-etch-security: N/A +2.6.8-sarge-security: N/A +2.4.27-sarge-security: N/A +2.6.15-dapper-security: ignored +2.6.17-edgy-security: ignored - no upstream fix. +2.6.20-feisty-security: ignored - no upstream fix. |