Bug 217008

Summary: CVE-2006-6057 gfs2 init_journal denial of service
Product: Red Hat Enterprise Linux 5 Reporter: Marcel Holtmann <holtmann>
Component: kernelAssignee: Russell Cattelan <cattelan>
Status: CLOSED CURRENTRELEASE QA Contact: Brian Brock <bbrock>
Severity: low Docs Contact:
Priority: medium    
Version: 5.0CC: dzickus, lwang, security-response-team, swhiteho
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard: impact=low,source=internet,reported=20061115,public=20061115
Fixed In Version: RC Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2007-02-08 00:52:05 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Attachments:
Description Flags
Proposed fix
none
New proposed patch none

Description Marcel Holtmann 2006-11-23 05:50:01 UTC
From MOKB-15-11-2006:

http://projects.info-pull.com/mokb/MOKB-15-11-2006.html

The gfs2 filesystem code fails to properly handle corrupted data structures,
leading to an exploitable denial of service issue when a crafted stream is being
mounted. This particular vulnerability is caused by a NULL pointer dereference
in the init_journal function.

Comment 4 Russell Cattelan 2007-01-05 16:28:22 UTC
Created attachment 144912 [details]
Proposed fix

Comment 6 Russell Cattelan 2007-01-06 00:12:38 UTC
Created attachment 144947 [details]
New proposed patch

Comment 7 Jay Turner 2007-01-10 15:26:31 UTC
Built into 2.6.18-1.3002.el5.

Comment 9 Don Zickus 2007-01-10 23:56:06 UTC
in 2.6.18-1.3002.el5

Comment 10 RHEL Program Management 2007-02-08 00:52:05 UTC
A package has been built which should help the problem described in 
this bug report. This report is therefore being closed with a resolution 
of CURRENTRELEASE. You may reopen this bug report if the solution does 
not work for you.