Candidate: CVE-2006-6058 References: http://git.kernel.org/?p=linux/kernel/git/stable/linux-2.6.23.y.git;a=commitdiff;h=f0ae3188daf70ed07a4dfbeb133bef3a92838a15 MISC:http://projects.info-pull.com/mokb/MOKB-17-11-2006.html FRSIRT:ADV-2006-4613 URL:http://www.frsirt.com/english/advisories/2006/4613 SECUNIA:23034 URL:http://secunia.com/advisories/23034 Description: The minix filesystem code in Linux kernel 2.6.x up to 2.6.18, and possibly other versions, allows local users to cause a denial of service (hang) via a malformed minix file stream that triggers an infinite loop in the minix_bmap function. NOTE: this issue might be due to an integer overflow or signedness error. Ubuntu-Description: Notes: dannf> ignored for sarge for now - only applies under very rare circumstances and don't know if there's an upstream fix jmm> We can ignore this, it has no practical ramifications Bugs: upstream: released (2.6.23.2) linux-2.6: ignored 2.6.18-etch-security: ignored 2.6.8-sarge-security: ignored 2.4.27-sarge-security: ignored 2.6.15-dapper-security: needed 2.6.17-edgy-security: needed 2.6.20-feisty-security: needed 2.6.22-gutsy-security: needed