summaryrefslogtreecommitdiffstats
path: root/retired/CVE-2006-7203
blob: c35972325f0fbf40606a6fd191ea50d0a5970410 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
Candidate: CVE-2006-7203
References:
 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff_plain;h=822191a2fa1584a29c3224ab328507adcaeac1ab
Description: 
 The compat_sys_mount function in fs/compat.c in Linux kernel 2.6.20
 and earlier allows local users to cause a denial of service (NULL
 pointer dereference and oops) by mounting a smbfs file system in
 compatibility mode ("mount -t smbfs").
Ubuntu-Description: 
 The compat_sys_mount function allowed local users to cause a denial of
 service when mounting a smbfs filesystem in compatibility mode.
Notes: 
 jmm> Vulnerable code not present in 2.4.27
Bugs: 
upstream: released (2.6.20, 2.6.18.6)
linux-2.6: released (2.6.20-1)
2.6.18-etch-security: released (2.6.18.dfsg.1-9) [bugfix/2.6.18.6]
2.6.8-sarge-security: released (2.6.8-17sarge1) [compat_sys_mount-NULL-data_page.dpatch]
2.4.27-sarge-security: N/A
2.6.15-dapper-security: released (2.6.15-28.57)
2.6.17-edgy-security: released (2.6.17.1-11.39) [b47f37617947e31bb19441e18714683e4ec86820]
2.6.20-feisty-security: N/A

© 2014-2024 Faster IT GmbH | imprint | privacy policy