Upstream information
Description
The ext2 file system code in Linux kernel 2.6.x allows local users to cause a denial of service (crash) via an ext2 stream with malformed data structures that triggers an error in the ext2_check_page due to a length that is smaller than the minimum.SUSE information
Overall state of this security issue: Resolved
This issue is currently not rated by SUSE as it is not affecting the SUSE Enterprise products.
National Vulnerability Database | |
---|---|
Base Score | 4 |
Vector | AV:L/AC:H/Au:N/C:N/I:N/A:C |
Access Vector | Local |
Access Complexity | High |
Authentication | None |
Confidentiality Impact | None |
Integrity Impact | None |
Availability Impact | Complete |
SUSE Security Advisories:
- SUSE-SA:2006:079, published Thu, 21 Dec 2006 14:00:00 +0000
SUSE Timeline for this CVE
CVE page created: Fri Jun 28 05:17:49 2013CVE page last modified: Sat Sep 7 19:10:01 2024