Candidate: CVE-2007-1357 References: http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=75559c167bddc1254db5bcff032ad5eed8bd6f4a Description: Ubuntu-Description: Philipp Richter discovered that the AppleTalk protocol handler did not sufficiently verify the length of packets. By sending a crafted AppleTalk packet, a remote attacker could exploit this to crash the kernel. Notes: dannf> commit msg says that the vulnerable code was added in 2.6.0-test5: http://git.kernel.org/?p=linux/kernel/git/tglx/history.git;a=commitdiff;h=7ab442d7e0a76402c12553ee256f756097cae2d2 This code was never backported to 2.4, so I'm assuming its not vulnerable Bugs: upstream: released (2.6.21-rc6) linux-2.6: released (2.6.20-1) [bugfix/2.6.20.5] 2.6.18-etch-security: released (2.6.18.dfsg.1-12etch1) [bugfix/appletalk-length-mismatch.patch, bugfix/appletalk-endianness-annotations.patch] 2.6.8-sarge-security: released (2.6.8-16sarge7) [appletalk-length-mismatch.dpatch, appletalk-endianness-annotations.dpatch] 2.4.27-sarge-security: N/A 2.6.15-dapper-security: released (2.6.15-28.54) 2.6.17-edgy-security: released (2.6.17.1-11.38) 2.6.20-feisty-security: released (2.6.20-16.28)