Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2006-6054
PUBLISHED
More InfoOfficial Page
Assigner-mitre
Assigner Org ID-8254265b-2729-46b6-b9e3-3dfca2d5bfca
View Known Exploited Vulnerability (KEV) details
Published At-22 Nov, 2006 | 01:00
Updated At-07 Aug, 2024 | 20:12
Rejected At-
▼CVE Numbering Authority (CNA)

The ext2 file system code in Linux kernel 2.6.x allows local users to cause a denial of service (crash) via an ext2 stream with malformed data structures that triggers an error in the ext2_check_page due to a length that is smaller than the minimum.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://rhn.redhat.com/errata/RHSA-2007-0436.html
vendor-advisory
x_refsource_REDHAT
http://secunia.com/advisories/24098
third-party-advisory
x_refsource_SECUNIA
http://www.novell.com/linux/security/advisories/2006_79_kernel.html
vendor-advisory
x_refsource_SUSE
http://www.redhat.com/support/errata/RHSA-2007-0673.html
vendor-advisory
x_refsource_REDHAT
http://rhn.redhat.com/errata/RHSA-2007-0014.html
vendor-advisory
x_refsource_REDHAT
http://www.vupen.com/english/advisories/2006/4487
vdb-entry
x_refsource_VUPEN
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10006
vdb-entry
signature
x_refsource_OVAL
http://secunia.com/advisories/27528
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/26379
third-party-advisory
x_refsource_SECUNIA
http://support.avaya.com/elmodocs2/security/ASA-2007-063.htm
x_refsource_CONFIRM
http://www.ubuntu.com/usn/usn-416-1
vendor-advisory
x_refsource_UBUNTU
http://www.debian.org/security/2008/dsa-1504
vendor-advisory
x_refsource_DEBIAN
http://secunia.com/advisories/24206
third-party-advisory
x_refsource_SECUNIA
http://www.redhat.com/support/errata/RHSA-2007-0672.html
vendor-advisory
x_refsource_REDHAT
http://secunia.com/advisories/23474
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/22837
third-party-advisory
x_refsource_SECUNIA
http://projects.info-pull.com/mokb/MOKB-12-11-2006.html
x_refsource_MISC
http://secunia.com/advisories/23997
third-party-advisory
x_refsource_SECUNIA
http://www.securityfocus.com/archive/1/471457
mailing-list
x_refsource_BUGTRAQ
http://www.debian.org/security/2008/dsa-1503
vendor-advisory
x_refsource_DEBIAN
https://exchange.xforce.ibmcloud.com/vulnerabilities/30201
vdb-entry
x_refsource_XF
http://secunia.com/advisories/29058
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/25630
third-party-advisory
x_refsource_SECUNIA
http://secunia.com/advisories/25691
third-party-advisory
x_refsource_SECUNIA
http://support.avaya.com/elmodocs2/security/ASA-2007-404.htm
x_refsource_CONFIRM
Hyperlink: http://rhn.redhat.com/errata/RHSA-2007-0436.html
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: http://secunia.com/advisories/24098
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.novell.com/linux/security/advisories/2006_79_kernel.html
Resource:
vendor-advisory
x_refsource_SUSE
Hyperlink: http://www.redhat.com/support/errata/RHSA-2007-0673.html
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: http://rhn.redhat.com/errata/RHSA-2007-0014.html
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: http://www.vupen.com/english/advisories/2006/4487
Resource:
vdb-entry
x_refsource_VUPEN
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10006
Resource:
vdb-entry
signature
x_refsource_OVAL
Hyperlink: http://secunia.com/advisories/27528
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/26379
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://support.avaya.com/elmodocs2/security/ASA-2007-063.htm
Resource:
x_refsource_CONFIRM
Hyperlink: http://www.ubuntu.com/usn/usn-416-1
Resource:
vendor-advisory
x_refsource_UBUNTU
Hyperlink: http://www.debian.org/security/2008/dsa-1504
Resource:
vendor-advisory
x_refsource_DEBIAN
Hyperlink: http://secunia.com/advisories/24206
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.redhat.com/support/errata/RHSA-2007-0672.html
Resource:
vendor-advisory
x_refsource_REDHAT
Hyperlink: http://secunia.com/advisories/23474
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/22837
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://projects.info-pull.com/mokb/MOKB-12-11-2006.html
Resource:
x_refsource_MISC
Hyperlink: http://secunia.com/advisories/23997
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://www.securityfocus.com/archive/1/471457
Resource:
mailing-list
x_refsource_BUGTRAQ
Hyperlink: http://www.debian.org/security/2008/dsa-1503
Resource:
vendor-advisory
x_refsource_DEBIAN
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/30201
Resource:
vdb-entry
x_refsource_XF
Hyperlink: http://secunia.com/advisories/29058
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/25630
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://secunia.com/advisories/25691
Resource:
third-party-advisory
x_refsource_SECUNIA
Hyperlink: http://support.avaya.com/elmodocs2/security/ASA-2007-404.htm
Resource:
x_refsource_CONFIRM
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
http://rhn.redhat.com/errata/RHSA-2007-0436.html
vendor-advisory
x_refsource_REDHAT
x_transferred
http://secunia.com/advisories/24098
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.novell.com/linux/security/advisories/2006_79_kernel.html
vendor-advisory
x_refsource_SUSE
x_transferred
http://www.redhat.com/support/errata/RHSA-2007-0673.html
vendor-advisory
x_refsource_REDHAT
x_transferred
http://rhn.redhat.com/errata/RHSA-2007-0014.html
vendor-advisory
x_refsource_REDHAT
x_transferred
http://www.vupen.com/english/advisories/2006/4487
vdb-entry
x_refsource_VUPEN
x_transferred
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10006
vdb-entry
signature
x_refsource_OVAL
x_transferred
http://secunia.com/advisories/27528
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/26379
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://support.avaya.com/elmodocs2/security/ASA-2007-063.htm
x_refsource_CONFIRM
x_transferred
http://www.ubuntu.com/usn/usn-416-1
vendor-advisory
x_refsource_UBUNTU
x_transferred
http://www.debian.org/security/2008/dsa-1504
vendor-advisory
x_refsource_DEBIAN
x_transferred
http://secunia.com/advisories/24206
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.redhat.com/support/errata/RHSA-2007-0672.html
vendor-advisory
x_refsource_REDHAT
x_transferred
http://secunia.com/advisories/23474
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/22837
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://projects.info-pull.com/mokb/MOKB-12-11-2006.html
x_refsource_MISC
x_transferred
http://secunia.com/advisories/23997
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://www.securityfocus.com/archive/1/471457
mailing-list
x_refsource_BUGTRAQ
x_transferred
http://www.debian.org/security/2008/dsa-1503
vendor-advisory
x_refsource_DEBIAN
x_transferred
https://exchange.xforce.ibmcloud.com/vulnerabilities/30201
vdb-entry
x_refsource_XF
x_transferred
http://secunia.com/advisories/29058
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/25630
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://secunia.com/advisories/25691
third-party-advisory
x_refsource_SECUNIA
x_transferred
http://support.avaya.com/elmodocs2/security/ASA-2007-404.htm
x_refsource_CONFIRM
x_transferred
Hyperlink: http://rhn.redhat.com/errata/RHSA-2007-0436.html
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: http://secunia.com/advisories/24098
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.novell.com/linux/security/advisories/2006_79_kernel.html
Resource:
vendor-advisory
x_refsource_SUSE
x_transferred
Hyperlink: http://www.redhat.com/support/errata/RHSA-2007-0673.html
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: http://rhn.redhat.com/errata/RHSA-2007-0014.html
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: http://www.vupen.com/english/advisories/2006/4487
Resource:
vdb-entry
x_refsource_VUPEN
x_transferred
Hyperlink: https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10006
Resource:
vdb-entry
signature
x_refsource_OVAL
x_transferred
Hyperlink: http://secunia.com/advisories/27528
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/26379
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://support.avaya.com/elmodocs2/security/ASA-2007-063.htm
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: http://www.ubuntu.com/usn/usn-416-1
Resource:
vendor-advisory
x_refsource_UBUNTU
x_transferred
Hyperlink: http://www.debian.org/security/2008/dsa-1504
Resource:
vendor-advisory
x_refsource_DEBIAN
x_transferred
Hyperlink: http://secunia.com/advisories/24206
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.redhat.com/support/errata/RHSA-2007-0672.html
Resource:
vendor-advisory
x_refsource_REDHAT
x_transferred
Hyperlink: http://secunia.com/advisories/23474
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/22837
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://projects.info-pull.com/mokb/MOKB-12-11-2006.html
Resource:
x_refsource_MISC
x_transferred
Hyperlink: http://secunia.com/advisories/23997
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://www.securityfocus.com/archive/1/471457
Resource:
mailing-list
x_refsource_BUGTRAQ
x_transferred
Hyperlink: http://www.debian.org/security/2008/dsa-1503
Resource:
vendor-advisory
x_refsource_DEBIAN
x_transferred
Hyperlink: https://exchange.xforce.ibmcloud.com/vulnerabilities/30201
Resource:
vdb-entry
x_refsource_XF
x_transferred
Hyperlink: http://secunia.com/advisories/29058
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/25630
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://secunia.com/advisories/25691
Resource:
third-party-advisory
x_refsource_SECUNIA
x_transferred
Hyperlink: http://support.avaya.com/elmodocs2/security/ASA-2007-404.htm
Resource:
x_refsource_CONFIRM
x_transferred
Details not found