summaryrefslogtreecommitdiffstats
path: root/ignored
diff options
context:
space:
mode:
authorMoritz Muehlenhoff <jmm@debian.org>2007-05-27 15:33:24 +0000
committerMoritz Muehlenhoff <jmm@debian.org>2007-05-27 15:33:24 +0000
commit1ddc19aa57a95daa3360f75d53531b61c3172982 (patch)
treebb7da21f8e2535343bed301167d4d84598cfe1db /ignored
parentc20a11308ef3d5af7a6584f52994e1939d4c3a0e (diff)
ignore CVE-2007-1217
git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@839 e094ebfe-e918-0410-adfb-c712417f3574
Diffstat (limited to 'ignored')
-rw-r--r--ignored/CVE-2007-121723
1 files changed, 23 insertions, 0 deletions
diff --git a/ignored/CVE-2007-1217 b/ignored/CVE-2007-1217
new file mode 100644
index 00000000..d7e29322
--- /dev/null
+++ b/ignored/CVE-2007-1217
@@ -0,0 +1,23 @@
+Candidate: CVE-2007-1217
+References:
+Description:
+Ubuntu-Description:
+Notes:
+ jmm> Analysis by Karsten Keil (the Linux ISDN maintainer) pointed out, that this
+ jmm> is not exploitable over the ISDN network, as the generated CAPI messages
+ jmm> cannot reach a size allowing an overflow.
+ jmm> This could only be theoretically exploited if there's a pure CAPI server
+ jmm> and even then it's only DoS.
+ jmm>
+ jmm> We'll ignore this, as it's not exploitable over ISDN
+ jmm>
+ jmm> http://bugzilla.kernel.org/show_bug.cgi?id=8028
+Bugs:
+upstream: released (2.6.21)
+linux-2.6: released (2.6.21-1)
+2.6.18-etch-security: ignored
+2.6.8-sarge-security: ignored
+2.4.27-sarge-security: ignored
+2.6.15-dapper-security:
+2.6.17-edgy-security:
+2.6.20-feisty-security:

© 2014-2024 Faster IT GmbH | imprint | privacy policy