From eaf8a47df72b4fe638c64ecdf28d677bebc85a61 Mon Sep 17 00:00:00 2001 From: Kees Cook Date: Thu, 31 May 2007 20:54:49 +0000 Subject: updates for ubuntu releases git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@843 e094ebfe-e918-0410-adfb-c712417f3574 --- ignored/CVE-2007-1217 | 10 +++++++--- 1 file changed, 7 insertions(+), 3 deletions(-) (limited to 'ignored/CVE-2007-1217') diff --git a/ignored/CVE-2007-1217 b/ignored/CVE-2007-1217 index d7e29322..9e95216c 100644 --- a/ignored/CVE-2007-1217 +++ b/ignored/CVE-2007-1217 @@ -1,6 +1,10 @@ Candidate: CVE-2007-1217 References: Description: + Buffer overflow in the bufprint function in capiutil.c in libcapi, as used + in Linux kernel 2.6.9 to 2.6.20 and isdn4k-utils, allows local users to + cause a denial of service (crash) and possibly gain privileges via a + crafted CAPI packet. Ubuntu-Description: Notes: jmm> Analysis by Karsten Keil (the Linux ISDN maintainer) pointed out, that this @@ -18,6 +22,6 @@ linux-2.6: released (2.6.21-1) 2.6.18-etch-security: ignored 2.6.8-sarge-security: ignored 2.4.27-sarge-security: ignored -2.6.15-dapper-security: -2.6.17-edgy-security: -2.6.20-feisty-security: +2.6.15-dapper-security: ignored +2.6.17-edgy-security: ignored +2.6.20-feisty-security: ignored -- cgit v1.2.3