Public bug reported: Binary package hint: linux-source
Quoting CVE-2007-6063: "Buffer overflow in the isdn_net_setcfg function in isdn_net.c in Linux kernel 2.6.23 allows local users to have an unknown impact via a crafted argument to the isdn_ioctl function." Although only reported for 2.6.23, this bug got fixed for Debian Etch's kernel, see DSA-1436-1 (http://www.debian.org/security/2007/dsa-1436). ** Affects: linux-meta (Ubuntu) Importance: Undecided Status: New ** Visibility changed to: Public ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2007-6063 -- [linux-source] [CVE-2007-6063] Buffer overflow in the isdn_net_setcfg function in isdn_net.c, possible local vulnerability https://bugs.launchpad.net/bugs/180292 You received this bug notification because you are a member of Ubuntu Bugs, which is the bug contact for Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs