summaryrefslogtreecommitdiffstats
path: root/retired/CVE-2007-1357
blob: 11e71408402a054ff1a8c958938a70599d0a0635 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
Candidate: CVE-2007-1357
References: 
 http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=75559c167bddc1254db5bcff032ad5eed8bd6f4a
Description: 
Ubuntu-Description: 
 Philipp Richter discovered that the AppleTalk protocol handler did
 not sufficiently verify the length of packets. By sending a crafted
 AppleTalk packet, a remote attacker could exploit this to crash the
 kernel.
Notes: 
 dannf> commit msg says that the vulnerable code was added in 2.6.0-test5:
          http://git.kernel.org/?p=linux/kernel/git/tglx/history.git;a=commitdiff;h=7ab442d7e0a76402c12553ee256f756097cae2d2
        This code was never backported to 2.4, so I'm assuming its not
        vulnerable
Bugs: 
upstream: released (2.6.21-rc6)
linux-2.6: released (2.6.20-1) [bugfix/2.6.20.5]
2.6.18-etch-security: released (2.6.18.dfsg.1-12etch1) [bugfix/appletalk-length-mismatch.patch, bugfix/appletalk-endianness-annotations.patch]
2.6.8-sarge-security: released (2.6.8-16sarge7) [appletalk-length-mismatch.dpatch, appletalk-endianness-annotations.dpatch]
2.4.27-sarge-security: N/A
2.6.15-dapper-security: released (2.6.15-28.54)
2.6.17-edgy-security: released (2.6.17.1-11.38)
2.6.20-feisty-security: released (2.6.20-16.28)

© 2014-2024 Faster IT GmbH | imprint | privacy policy