diff options
author | Moritz Muehlenhoff <jmm@debian.org> | 2007-05-27 15:33:24 +0000 |
---|---|---|
committer | Moritz Muehlenhoff <jmm@debian.org> | 2007-05-27 15:33:24 +0000 |
commit | 1ddc19aa57a95daa3360f75d53531b61c3172982 (patch) | |
tree | bb7da21f8e2535343bed301167d4d84598cfe1db /ignored | |
parent | c20a11308ef3d5af7a6584f52994e1939d4c3a0e (diff) |
ignore CVE-2007-1217
git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@839 e094ebfe-e918-0410-adfb-c712417f3574
Diffstat (limited to 'ignored')
-rw-r--r-- | ignored/CVE-2007-1217 | 23 |
1 files changed, 23 insertions, 0 deletions
diff --git a/ignored/CVE-2007-1217 b/ignored/CVE-2007-1217 new file mode 100644 index 00000000..d7e29322 --- /dev/null +++ b/ignored/CVE-2007-1217 @@ -0,0 +1,23 @@ +Candidate: CVE-2007-1217 +References: +Description: +Ubuntu-Description: +Notes: + jmm> Analysis by Karsten Keil (the Linux ISDN maintainer) pointed out, that this + jmm> is not exploitable over the ISDN network, as the generated CAPI messages + jmm> cannot reach a size allowing an overflow. + jmm> This could only be theoretically exploited if there's a pure CAPI server + jmm> and even then it's only DoS. + jmm> + jmm> We'll ignore this, as it's not exploitable over ISDN + jmm> + jmm> http://bugzilla.kernel.org/show_bug.cgi?id=8028 +Bugs: +upstream: released (2.6.21) +linux-2.6: released (2.6.21-1) +2.6.18-etch-security: ignored +2.6.8-sarge-security: ignored +2.4.27-sarge-security: ignored +2.6.15-dapper-security: +2.6.17-edgy-security: +2.6.20-feisty-security: |