blob: 9e97c347da4917e67d982c6edd98252b05139d6e (
plain) (
blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
|
Candidate: CVE-2007-1217
References:
Description:
Ubuntu-Description:
Notes:
jmm> Analysis by Karsten Keil (the Linux ISDN maintainer) pointed out, that this
jmm> is not exploitable over the ISDN network, as the generated CAPI messages
jmm> cannot reach a size allowing an overflow.
jmm> This could only be theoretically exploited if there's a pure CAPI server
jmm> and even then it's only DoS.
jmm>
jmm> I'm not convinced we need to fix this
jmm>
jmm> http://bugzilla.kernel.org/show_bug.cgi?id=8028
Bugs:
upstream: released (2.6.21)
linux-2.6: needed
2.6.18-etch-security:
2.6.8-sarge-security:
2.4.27-sarge-security:
2.6.15-dapper-security:
2.6.17-edgy-security:
2.6.20-feisty-security:
|