From 1ddc19aa57a95daa3360f75d53531b61c3172982 Mon Sep 17 00:00:00 2001 From: Moritz Muehlenhoff Date: Sun, 27 May 2007 15:33:24 +0000 Subject: ignore CVE-2007-1217 git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@839 e094ebfe-e918-0410-adfb-c712417f3574 --- ignored/CVE-2007-1217 | 23 +++++++++++++++++++++++ 1 file changed, 23 insertions(+) create mode 100644 ignored/CVE-2007-1217 (limited to 'ignored') diff --git a/ignored/CVE-2007-1217 b/ignored/CVE-2007-1217 new file mode 100644 index 00000000..d7e29322 --- /dev/null +++ b/ignored/CVE-2007-1217 @@ -0,0 +1,23 @@ +Candidate: CVE-2007-1217 +References: +Description: +Ubuntu-Description: +Notes: + jmm> Analysis by Karsten Keil (the Linux ISDN maintainer) pointed out, that this + jmm> is not exploitable over the ISDN network, as the generated CAPI messages + jmm> cannot reach a size allowing an overflow. + jmm> This could only be theoretically exploited if there's a pure CAPI server + jmm> and even then it's only DoS. + jmm> + jmm> We'll ignore this, as it's not exploitable over ISDN + jmm> + jmm> http://bugzilla.kernel.org/show_bug.cgi?id=8028 +Bugs: +upstream: released (2.6.21) +linux-2.6: released (2.6.21-1) +2.6.18-etch-security: ignored +2.6.8-sarge-security: ignored +2.4.27-sarge-security: ignored +2.6.15-dapper-security: +2.6.17-edgy-security: +2.6.20-feisty-security: -- cgit v1.2.3