Upstream information

CVE-2006-6054 at MITRE

Description

The ext2 file system code in Linux kernel 2.6.x allows local users to cause a denial of service (crash) via an ext2 stream with malformed data structures that triggers an error in the ext2_check_page due to a length that is smaller than the minimum.

SUSE information

Overall state of this security issue: Resolved

This issue is currently rated as having moderate severity.

CVSS v2 Scores
  National Vulnerability Database
Base Score 4
Vector AV:L/AC:H/Au:N/C:N/I:N/A:C
Access Vector Local
Access Complexity High
Authentication None
Confidentiality Impact None
Integrity Impact None
Availability Impact Complete
SUSE Bugzilla entry: 220330 [RESOLVED / FIXED]

SUSE Security Advisories:

List of released packages

Product(s) Fixed package version(s) References
Novell Linux Desktop 9 for x86_64
  • kernel-default >= 2.6.5-7.283
  • kernel-smp >= 2.6.5-7.283
  • kernel-source >= 2.6.5-7.283
  • kernel-syms >= 2.6.5-7.283
Builds
YOU Patch Nr: 11359
Novell Linux Desktop 9 for x86
  • kernel-bigsmp >= 2.6.5-7.283
  • kernel-default >= 2.6.5-7.283
  • kernel-smp >= 2.6.5-7.283
  • kernel-source >= 2.6.5-7.283
  • kernel-syms >= 2.6.5-7.283
Builds
YOU Patch Nr: 11358
Open Enterprise Server
  • kernel-bigsmp >= 2.6.5-7.283
  • kernel-debug >= 2.6.5-7.283
  • kernel-default >= 2.6.5-7.283
  • kernel-smp >= 2.6.5-7.283
  • kernel-source >= 2.6.5-7.283
  • kernel-syms >= 2.6.5-7.283
  • kernel-um >= 2.6.5-7.283
  • um-host-install-initrd >= 1.0-48.21
  • um-host-kernel >= 2.6.5-7.283
Builds
YOU Patch Nr: 11358