CVE-2007-6063
Published: 21 November 2007
Buffer overflow in the isdn_net_setcfg function in isdn_net.c in Linux kernel 2.6.23 allows local users to have an unknown impact via a crafted argument to the isdn_ioctl function.
Notes
Author | Note |
---|---|
jdstrand | impact unknown |
Priority
Status
Package | Release | Status |
---|---|---|
linux-source Launchpad, Ubuntu, Debian |
upstream |
Needs triage
|
linux-source-2.6.15 Launchpad, Ubuntu, Debian |
upstream |
Needed
|
dapper |
Released
(2.6.15-51.66)
|
|
edgy |
Does not exist
|
|
feisty |
Does not exist
|
|
gutsy |
Does not exist
|
|
linux-source-2.6.17 Launchpad, Ubuntu, Debian |
upstream |
Needed
|
dapper |
Does not exist
|
|
edgy |
Released
(2.6.17.1-12.43)
|
|
feisty |
Does not exist
|
|
gutsy |
Does not exist
|
|
linux-source-2.6.20 Launchpad, Ubuntu, Debian |
upstream |
Needs triage
|
dapper |
Does not exist
|
|
edgy |
Does not exist
|
|
feisty |
Released
(2.6.20-16.34)
|
|
gutsy |
Does not exist
|
|
linux-source-2.6.22 Launchpad, Ubuntu, Debian |
upstream |
Needs triage
|
dapper |
Does not exist
|
|
edgy |
Does not exist
|
|
feisty |
Does not exist
|
|
gutsy |
Released
(2.6.22-14.51)
|
|
linux Launchpad, Ubuntu, Debian |
upstream |
Needs triage
|
dapper |
Does not exist
|
|
edgy |
Does not exist
|
|
feisty |
Does not exist
|
|
gutsy |
Does not exist
|
|
Patches: vendor: http://www.debian.org/security/2007/dsa-1436 |