Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2006-6056

Опубликовано: 14 нояб. 2006
Источник: redhat
EPSS Низкий

Описание

Linux kernel 2.6.x up to 2.6.18 and possibly other versions, when SELinux hooks are enabled, allows local users to cause a denial of service (crash) via a malformed file stream that triggers a NULL pointer dereference in the superblock_doinit function, as demonstrated using an HFS filesystem image.

Отчет

Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.

Дополнительная информация

EPSS

Процентиль: 14%
0.00048
Низкий

Связанные уязвимости

ubuntu
почти 19 лет назад

Linux kernel 2.6.x up to 2.6.18 and possibly other versions, when SELinux hooks are enabled, allows local users to cause a denial of service (crash) via a malformed file stream that triggers a NULL pointer dereference in the superblock_doinit function, as demonstrated using an HFS filesystem image.

nvd
почти 19 лет назад

Linux kernel 2.6.x up to 2.6.18 and possibly other versions, when SELinux hooks are enabled, allows local users to cause a denial of service (crash) via a malformed file stream that triggers a NULL pointer dereference in the superblock_doinit function, as demonstrated using an HFS filesystem image.

debian
почти 19 лет назад

Linux kernel 2.6.x up to 2.6.18 and possibly other versions, when SELi ...

github
больше 3 лет назад

Linux kernel 2.6.x up to 2.6.18 and possibly other versions, when SELinux hooks are enabled, allows local users to cause a denial of service (crash) via a malformed file stream that triggers a NULL pointer dereference in the superblock_doinit function, as demonstrated using an HFS filesystem image.

EPSS

Процентиль: 14%
0.00048
Низкий