Red Hat Bugzilla – Bug 217024
CVE-2006-6054 ext2_check_page denial of service
Last modified: 2007-11-30 17:06:55 EST
The ext2 filesystem code fails to properly handle corrupted data structures,
leading to an exploitable denial of service issue when read operation is being
done on a crafted fs stream.
While this does cause a noticable slowdown, the system is still accessable and
usable. I don't think this rises to the level of a security issue.
A patch addressing this issue has been included in kernel-2.4.18-e.65.
An advisory has been issued which should help the problem
described in this bug report. This report is therefore being
closed with a resolution of ERRATA. For more information
on the solution and/or where to find the updated files,
please follow the link below. You may reopen this bug report
if the solution does not work for you.