Candidate: CVE-2005-0177 References: CONFIRM:http://linux.bkbits.net:8080/linux-2.6/cset@41e2bfbeOiXFga62XrBhzm7Kv9QDmQ CONECTIVA:CLA-2005:930 URL:http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000930 REDHAT:RHSA-2005:092 URL:http://www.redhat.com/support/errata/RHSA-2005-092.html BUGTRAQ:20050215 [USN-82-1] Linux kernel vulnerabilities URL:http://marc.theaimsgroup.com/?l=full-disclosure&m=110846102231365&w=2 Description: nls_ascii.c in Linux before 2.6.8.1 uses an incorrect table size, which allows attackers to cause a denial of service (kernel crash) via a buffer overflow. Notes: dannf> nls_ascii.c isn't in <= 2.4.27 Bugs: upstream: released (2.6.8.1, 2.6.11) linux-2.6: N/A 2.6.8-sarge-security: released (2.6.8-14) [nls-table-overflow.dpatch] 2.4.27-sarge-security: N/A 2.4.19-woody-security: N/A 2.4.18-woody-security: N/A 2.4.17-woody-security: N/A 2.4.16-woody-security: N/A 2.4.17-woody-security-hppa: N/A 2.4.17-woody-security-ia64: N/A 2.4.18-woody-security-hppa: N/A