From f0b3303c9a82b65f78e929e08389b1ec88034e2b Mon Sep 17 00:00:00 2001 From: Moritz Muehlenhoff Date: Fri, 22 Feb 2008 22:05:22 +0000 Subject: retire more issues git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@1142 e094ebfe-e918-0410-adfb-c712417f3574 --- retired/CVE-2006-5823 | 26 ++++++++++++++++++++++++++ 1 file changed, 26 insertions(+) create mode 100644 retired/CVE-2006-5823 (limited to 'retired/CVE-2006-5823') diff --git a/retired/CVE-2006-5823 b/retired/CVE-2006-5823 new file mode 100644 index 000000000..551302d9c --- /dev/null +++ b/retired/CVE-2006-5823 @@ -0,0 +1,26 @@ +Candidate: CVE-2006-5823 +References: + http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=8bb0269160df2a60764013994d0bc5165406cf4a + MISC:http://projects.info-pull.com/mokb/MOKB-07-11-2006.html + SECUNIA:22767 + URL:http://secunia.com/advisories/22767 +Description: + The zlib_inflate function in Linux kernel 2.6.x allows local users to cause a + denial of service (crash) via a malformed filesystem that uses zlib + compression that triggers memory corruption, as demonstrated using cramfs. +Ubuntu-Description: + A buffer overread was found in the zlib_inflate() function. By + tricking an user into mounting a specially crafted file system which + uses zlib compression (such as cramfs), this could be exploited to + crash the kernel. +Notes: + dannf> This is reproducible in 2.4.27 +Bugs: +upstream: released (2.4.36-pre2, 2.6.20-rc1) +linux-2.6: released (2.6.20-1) +2.6.18-etch-security: released (2.6.18.dfsg.1-10) +2.6.8-sarge-security: released (2.6.8-17sarge1) [cramfs-check-block-length.dpatch] +2.4.27-sarge-security: released (2.4.27-10sarge6) [254_cramfs-check-block-length.diff] +2.6.12-breezy-security: released (2.6.12-10.43) +2.6.15-dapper-security: released (2.6.15-28.51) +2.6.17-edgy-security: released (2.6.17.1-11.35) -- cgit v1.2.3