diff options
author | Moritz Muehlenhoff <jmm@debian.org> | 2010-09-01 09:45:29 +0000 |
---|---|---|
committer | Moritz Muehlenhoff <jmm@debian.org> | 2010-09-01 09:45:29 +0000 |
commit | dc90f805f714d68f8536979990a49e6f6cdbbc48 (patch) | |
tree | ac31f18deba33b136e76b118f18026c7eb57054f /retired/CVE-2010-2798 | |
parent | 28f953ea5c1454284c4a07fa734ebc1b4fea322e (diff) |
retire issue
git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@1946 e094ebfe-e918-0410-adfb-c712417f3574
Diffstat (limited to 'retired/CVE-2010-2798')
-rw-r--r-- | retired/CVE-2010-2798 | 16 |
1 files changed, 16 insertions, 0 deletions
diff --git a/retired/CVE-2010-2798 b/retired/CVE-2010-2798 new file mode 100644 index 00000000..3b8aab7a --- /dev/null +++ b/retired/CVE-2010-2798 @@ -0,0 +1,16 @@ +Candidate: CVE-2010-2798 +Description: + The problem was in the way the gfs2 directory code was trying to re-use + sentinel directory entries. A local, unprivileged user on a gfs2 + mounted directory can trigger this issue, resulting in a NULL pointer + dereference. +References: + https://bugzilla.redhat.com/show_bug.cgi?id=620300 + http://git.kernel.org/linus/728a756b8fcd22d80e2dbba8117a8a3aafd3f203 +Notes: +Bugs: +upstream: released (2.6.35) +2.6.32-upstream-stable: released (2.6.32.18) +linux-2.6: released (2.6.32-20) +2.6.26-lenny-security: released (2.6.26-24lenny1) [bugfix/all/gfs2-rename-causes-kernel-oops.patch] +2.6.32-squeeze-security: released (2.6.32-20) |