Red Hat Bugzilla – Bug 217022
CVE-2006-6054 ext2_check_page denial of service
Last modified: 2007-11-30 17:07:10 EST
The ext2 filesystem code fails to properly handle corrupted data structures,
leading to an exploitable denial of service issue when read operation is being
done on a crafted fs stream.
while Eric has the rhel4 one.
This request was evaluated by Red Hat Product Management for inclusion in a Red
Hat Enterprise Linux maintenance release. Product Management has requested
further review of this request by Red Hat Engineering, for potential
inclusion in a Red Hat Enterprise Linux Update release for currently deployed
products. This request is not yet committed for inclusion in an Update
QE ack for RHEL4.5.
A fix for this problem has just been committed to the RHEL3 U9
patch pool this evening (in kernel version 2.4.21-47.5.EL).
An advisory has been issued which should help the problem
described in this bug report. This report is therefore being
closed with a resolution of ERRATA. For more information
on the solution and/or where to find the updated files,
please follow the link below. You may reopen this bug report
if the solution does not work for you.