← Back to CVEs
CVE-2006-6058
N/ADescription
The minix filesystem code in Linux kernel 2.6.x before 2.6.24, including 2.6.18, allows local users to cause a denial of service (hang) via a malformed minix file stream that triggers an infinite loop in the minix_bmap function. NOTE: this issue might be due to an integer overflow or signedness error.
CVE Details
CVSS v3.1 ScoreN/A
Published11/22/2006
Last Modified4/23/2026
Sourcenvd
Honeypot Sightings0
Affected Products
linux:linux_kernel
Weaknesses (CWE)
CWE-189
References
http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.24(cve@mitre.org)
http://projects.info-pull.com/mokb/MOKB-17-11-2006.html(cve@mitre.org)
http://secunia.com/advisories/23034(cve@mitre.org)
http://secunia.com/advisories/26379(cve@mitre.org)
http://secunia.com/advisories/27528(cve@mitre.org)
http://secunia.com/advisories/27614(cve@mitre.org)
http://secunia.com/advisories/27703(cve@mitre.org)
http://secunia.com/advisories/28141(cve@mitre.org)
http://secunia.com/advisories/28170(cve@mitre.org)
http://secunia.com/advisories/28654(cve@mitre.org)
http://secunia.com/advisories/28706(cve@mitre.org)
http://secunia.com/advisories/28971(cve@mitre.org)
http://secunia.com/advisories/29058(cve@mitre.org)
http://support.avaya.com/elmodocs2/security/ASA-2007-404.htm(cve@mitre.org)
http://www.debian.org/security/2007/dsa-1436(cve@mitre.org)
http://www.debian.org/security/2008/dsa-1504(cve@mitre.org)
http://www.redhat.com/support/errata/RHSA-2007-0672.html(cve@mitre.org)
http://www.ubuntu.com/usn/usn-558-1(cve@mitre.org)
http://www.ubuntu.com/usn/usn-574-1(cve@mitre.org)
http://www.ubuntu.com/usn/usn-578-1(cve@mitre.org)
http://www.vupen.com/english/advisories/2006/4613(cve@mitre.org)
https://issues.rpath.com/browse/RPL-1929(cve@mitre.org)
http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.24(af854a3a-2127-422b-91ae-364da2661108)
http://projects.info-pull.com/mokb/MOKB-17-11-2006.html(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/23034(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/26379(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/27528(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/27614(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/27703(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/28141(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/28170(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/28654(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/28706(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/28971(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/29058(af854a3a-2127-422b-91ae-364da2661108)
http://support.avaya.com/elmodocs2/security/ASA-2007-404.htm(af854a3a-2127-422b-91ae-364da2661108)
http://www.debian.org/security/2007/dsa-1436(af854a3a-2127-422b-91ae-364da2661108)
http://www.debian.org/security/2008/dsa-1504(af854a3a-2127-422b-91ae-364da2661108)
http://www.mandriva.com/security/advisories?name=MDKSA-2007:226(af854a3a-2127-422b-91ae-364da2661108)
http://www.mandriva.com/security/advisories?name=MDKSA-2007:232(af854a3a-2127-422b-91ae-364da2661108)
http://www.mandriva.com/security/advisories?name=MDVSA-2008:008(af854a3a-2127-422b-91ae-364da2661108)
http://www.mandriva.com/security/advisories?name=MDVSA-2008:112(af854a3a-2127-422b-91ae-364da2661108)
http://www.novell.com/linux/security/advisories/2007_59_kernel.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.redhat.com/support/errata/RHSA-2007-0672.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.ubuntu.com/usn/usn-558-1(af854a3a-2127-422b-91ae-364da2661108)
http://www.ubuntu.com/usn/usn-574-1(af854a3a-2127-422b-91ae-364da2661108)
http://www.ubuntu.com/usn/usn-578-1(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2006/4613(af854a3a-2127-422b-91ae-364da2661108)
https://issues.rpath.com/browse/RPL-1929(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.