Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 155163 - Kernel: SELinux superblock_doinit denial of service
Summary: Kernel: SELinux superblock_doinit denial of service
Status: RESOLVED DUPLICATE of bug 158786
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Kernel (show other bugs)
Hardware: All Linux
: High normal (vote)
Assignee: Gentoo Security
URL: http://cve.mitre.org/cgi-bin/cvename....
Whiteboard: [2.6 < 2.6.18]
Keywords:
Depends on:
Blocks:
 
Reported: 2006-11-14 12:45 UTC by Jule Slootbeek
Modified: 2007-01-01 20:15 UTC (History)
0 users

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Jule Slootbeek 2006-11-14 12:45:30 UTC
MoKB reported the following bug in the 2.6.18 linux kernel and previous versions.

Failure to handle mounting of corrupt filesystem streams may lead to a local denial of service condition when SELinux hooks are enabled. This particular vulnerability is caused by a null pointer dereference in the superblock_doinit function.
Comment 1 Jule Slootbeek 2006-11-27 05:33:21 UTC
CVE-2006-6056 created: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6056
Comment 2 Daniel Drake (RETIRED) gentoo-dev 2007-01-01 20:15:38 UTC
CVE names need to go in summary field to help people find them

*** This bug has been marked as a duplicate of 158786 ***