Candidate: CVE-2006-6128 References: MISC:http://projects.info-pull.com/mokb/MOKB-25-11-2006.html FRSIRT:ADV-2006-4716 URL:http://www.frsirt.com/english/advisories/2006/4716 SECUNIA:23093 URL:http://secunia.com/advisories/23093 XF:linux-reiserfs-dos(30551) URL:http://xforce.iss.net/xforce/xfdb/30551 Description: The ReiserFS functionality in Linux kernel 2.6.18, and possibly other versions, allows local users to cause a denial of service via a malformed ReiserFS file system that triggers memory corruption when a sync is performed. Ubuntu-Description: Notes: dannf> low impact; no known upstream fix jmm> ignored, only exploitable with manipulated fs images, for which mount jmm> privs are needed dannf> https://bugzilla.redhat.com/show_bug.cgi?id=250625 suggests this maybe fedora-specific. Indeed, I cannot reproduce w/ the MOKB fs any of the Debian kernels Bugs: upstream: N/A linux-2.6: N/A 2.6.18-etch-security: N/A 2.6.8-sarge-security: N/A 2.4.27-sarge-security: N/A 2.6.15-dapper-security: ignored 2.6.17-edgy-security: ignored - no upstream fix. 2.6.20-feisty-security: ignored - no upstream fix.