CVSS2
Attack Vector
LOCAL
Attack Complexity
HIGH
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:L/AC:H/Au:N/C:N/I:N/A:C
AI Score
Confidence
High
EPSS
Percentile
55.4%
The minix filesystem code in Linux kernel 2.6.x before 2.6.24, including 2.6.18, allows local users to cause a denial of service (hang) via a malformed minix file stream that triggers an infinite loop in the minix_bmap function. NOTE: this issue might be due to an integer overflow or signedness error.
Vendor | Product | Version | CPE |
---|---|---|---|
linux | linux_kernel | 2.6.0 | cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:* |
linux | linux_kernel | 2.6.1 | cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:* |
linux | linux_kernel | 2.6.2 | cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:* |
linux | linux_kernel | 2.6.3 | cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:* |
linux | linux_kernel | 2.6.4 | cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:* |
linux | linux_kernel | 2.6.5 | cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:* |
linux | linux_kernel | 2.6.6 | cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:* |
linux | linux_kernel | 2.6.7 | cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:* |
linux | linux_kernel | 2.6.8 | cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:* |
linux | linux_kernel | 2.6.8.1 | cpe:2.3:o:linux:linux_kernel:2.6.8.1:*:*:*:*:*:*:* |
kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.24
projects.info-pull.com/mokb/MOKB-17-11-2006.html
secunia.com/advisories/23034
secunia.com/advisories/26379
secunia.com/advisories/27528
secunia.com/advisories/27614
secunia.com/advisories/27703
secunia.com/advisories/28141
secunia.com/advisories/28170
secunia.com/advisories/28654
secunia.com/advisories/28706
secunia.com/advisories/28971
secunia.com/advisories/29058
support.avaya.com/elmodocs2/security/ASA-2007-404.htm
www.debian.org/security/2007/dsa-1436
www.debian.org/security/2008/dsa-1504
www.mandriva.com/security/advisories?name=MDKSA-2007:226
www.mandriva.com/security/advisories?name=MDKSA-2007:232
www.mandriva.com/security/advisories?name=MDVSA-2008:008
www.mandriva.com/security/advisories?name=MDVSA-2008:112
www.novell.com/linux/security/advisories/2007_59_kernel.html
www.redhat.com/support/errata/RHSA-2007-0672.html
www.ubuntu.com/usn/usn-558-1
www.ubuntu.com/usn/usn-574-1
www.ubuntu.com/usn/usn-578-1
www.vupen.com/english/advisories/2006/4613
issues.rpath.com/browse/RPL-1929