[kernel-sec-discuss] r778 - active

Moritz Muehlenhoff jmm at alioth.debian.org
Mon Apr 30 17:22:37 UTC 2007


Author: jmm
Date: 2007-04-30 17:22:37 +0000 (Mon, 30 Apr 2007)
New Revision: 778

Modified:
   active/CVE-2007-1217
Log:
fill in information about CAPI overflow


Modified: active/CVE-2007-1217
===================================================================
--- active/CVE-2007-1217	2007-04-30 17:18:40 UTC (rev 777)
+++ active/CVE-2007-1217	2007-04-30 17:22:37 UTC (rev 778)
@@ -3,9 +3,18 @@
 Description: 
 Ubuntu-Description: 
 Notes: 
+ jmm> Analysis by Karsten Keil (the Linux ISDN maintainer) pointed out, that this
+ jmm> is not exploitable over the ISDN network, as the generated CAPI messages
+ jmm> cannot reach a size allowing an overflow.
+ jmm> This could only be theoretically exploited if there's a pure CAPI server
+ jmm> and even then it's only DoS.
+ jmm>
+ jmm> I'm not convinced we need to fix this
+ jmm>
+ jmm> http://bugzilla.kernel.org/show_bug.cgi?id=8028
 Bugs: 
-upstream: 
-linux-2.6: 
+upstream: released (2.6.21)
+linux-2.6: needed
 2.6.18-etch-security: 
 2.6.8-sarge-security: 
 2.4.27-sarge-security: 




More information about the kernel-sec-discuss mailing list