| Summary: |
VUL-0: CVE-2005-0177: kernel: buffer overflow in nls_ascii |
| Product: |
[Novell Products] SUSE Security Incidents
|
Reporter: |
Marcus Meissner <meissner> |
| Component: |
Incidents | Assignee: |
Marcus Meissner <meissner> |
| Status: |
RESOLVED
FIXED
|
QA Contact: |
Security Team bot <security-team> |
| Severity: |
Minor
|
|
|
| Priority: |
P3 - Medium
|
CC: |
security-team
|
| Version: |
unspecified | |
|
| Target Milestone: |
--- | |
|
| Hardware: |
All | |
|
| OS: |
Linux | |
|
| Whiteboard: |
CVE-2005-0177: CVSS v2 Base Score: 7.8 (AV:N/AC:L/Au:N/C:N/I:N/A:C) |
|
Found By:
|
Other
|
Services Priority:
|
|
|
Business Priority:
|
|
Blocker:
|
---
|
|
Marketing QA Status:
|
---
|
IT Deployment:
|
---
|
| Attachments: |
ascii-nlstable-overflow
|
20050110 nls_ascii incorrect table size OGAWA Hirofumi noticed that the table sizes in nls_ascii.c were incorrectly set to 128 instead of 256 and that it could lead to a denial of service (oops). Patch is available from upstream: +http://linux.bkbits.net:8080/linux-2.6/cset@41e2bfbeOiXFga62XrBhzm7Kv9QDmQ also included in patch from Alan, 2.6.10-ac9