Public bug reported:

Binary package hint: linux-source

Quoting CVE-2007-6063:
"Buffer overflow in the isdn_net_setcfg function in isdn_net.c in Linux kernel 
2.6.23 allows local users to have an unknown impact via a crafted argument to 
the isdn_ioctl function."

Although only reported for 2.6.23, this bug got fixed for Debian Etch's
kernel, see DSA-1436-1 (http://www.debian.org/security/2007/dsa-1436).

** Affects: linux-meta (Ubuntu)
     Importance: Undecided
         Status: New

** Visibility changed to: Public

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2007-6063

-- 
[linux-source] [CVE-2007-6063] Buffer overflow in the isdn_net_setcfg function 
in isdn_net.c, possible local vulnerability
https://bugs.launchpad.net/bugs/180292
You received this bug notification because you are a member of Ubuntu
Bugs, which is the bug contact for Ubuntu.

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to