Public bug reported: Binary package hint: linux-source
References: [1]: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-6058 [2]: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4997 Quoting [1]: "The minix filesystem code in Linux kernel 2.6.x up to 2.6.18, and possibly other versions, allows local users to cause a denial of service (hang) via a malformed minix file stream that triggers an infinite loop in the minix_bmap function. NOTE: this issue might be due to an integer overflow or signedness error." Quoting [2]: "Integer underflow in the ieee80211_rx function in net/ieee80211/ieee80211_rx.c in the Linux kernel 2.6.x before 2.6.23 allows remote attackers to cause a denial of service (crash) via a crafted SKB length value in a runt IEEE 802.11 frame when the IEEE80211_STYPE_QOS_DATA flag is set, aka an "off-by-two error."" ** Affects: linux-meta (Ubuntu) Importance: Undecided Status: New ** Visibility changed to: Public ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2006-6058 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2007-4997 -- [linux-source] multiple DoS vulnerabilities https://bugs.launchpad.net/bugs/164011 You received this bug notification because you are a member of Ubuntu Bugs, which is the bug contact for Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs