Candidate: CVE-2006-6056 References: http://www.kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=d6ddf55440833fd9404138026af246c51ebeef22 MISC:http://projects.info-pull.com/mokb/MOKB-14-11-2006.html Description: Linux kernel 2.6.x up to 2.6.18 and possibly other versions, when SELinux hooks are enabled, allows local users to cause a denial of service (crash) via a malformed file stream that triggers a NULL pointer dereference in the superblock_doinit function, as demonstrated using an HFS filesystem image. Ubuntu-Description: The hfs file system driver did not properly handle corrupted data structures. By mounting a specially crafted hfs file system, a local attacker could exploit this to crash the kernel. This only affects systems which enable SELinux (Ubuntu disables SELinux by default). Notes: dannf> Though this bug fix applies to 2.4, 2.4 does not include SELinux so it should not be vulnerable to the DoS Bugs: upstream: released (2.6.19) linux-2.6: released (2.6.18.dfsg.1-10) 2.6.18-etch-security: released (2.6.18.dfsg.1-10) [bugfix/2.6.16.38] 2.6.8-sarge-security: released (2.6.8-16sarge7) [hfs-no-root-inode.dpatch] 2.4.27-sarge-security: N/A 2.6.12-breezy-security: released (2.6.12-10.43) 2.6.15-dapper-security: released (2.6.15-28.51) 2.6.17-edgy-security: released (2.6.17.1-11.35)