blob: 9ac88f7e3ab0b6f74f1c325f05f398232019d022 (
plain) (
blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
|
Candidate: CVE-2006-6058
References:
MISC:http://projects.info-pull.com/mokb/MOKB-17-11-2006.html
FRSIRT:ADV-2006-4613
URL:http://www.frsirt.com/english/advisories/2006/4613
SECUNIA:23034
URL:http://secunia.com/advisories/23034
Description:
The minix filesystem code in Linux kernel 2.6.x up to 2.6.18, and possibly
other versions, allows local users to cause a denial of service (hang) via a
malformed minix file stream that triggers an infinite loop in the minix_bmap
function. NOTE: this issue might be due to an integer overflow or signedness
error.
Ubuntu-Description:
Notes:
dannf> ignored for sarge for now - only applies under very rare circumstances
and don't know if there's an upstream fix
jmm> We can ignore this, it has no practical ramifications
Bugs:
upstream: released (2.6.23.2)
linux-2.6: ignored
2.6.18-etch-security: ignored
2.6.8-sarge-security: ignored
2.4.27-sarge-security: ignored
2.6.15-dapper-security: needed
2.6.17-edgy-security: needed
|