Candidate: CVE-2007-6716 Description: fs/direct-io.c in the dio subsystem in the Linux kernel before 2.6.23 does not properly zero out the dio struct, which allows local users to cause a denial of service (OOPS), as demonstrated by a certain fio test. References: http://lkml.org/lkml/2007/7/30/448 http://www.openwall.com/lists/oss-security/2008/09/04/1 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=848c4dd5153c7a0de55470ce99a8e13a63b4703f https://bugzilla.redhat.com/show_bug.cgi?id=461082 http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.23 Ubuntu-Description: Notes: Bugs: upstream: released (2.6.23) linux-2.6: released (2.6.23-1) 2.6.18-etch-security: released (2.6.18.dfsg.1-22etch3) [bugfix/dio-zero-struct-dio-with-kzalloc-instead-of-manually.patch] 2.6.24-etch-security: N/A 2.6.26-lenny-security: N/A 2.6.15-dapper-security: released (2.6.15-52.73) 2.6.20-feisty-security: ignored (EOL) 2.6.22-gutsy-security: released (2.6.22-15.59) 2.6.24-hardy-security: N/A