Wind River Support Network

HomeOther DownloadsSecurity Advisory - linux kernel - CVE-2007-1217
Recommended Type: Patch

Security Advisory - linux kernel - CVE-2007-1217

Released: Oct 29, 2008     Updated: Oct 29, 2008

Description

Buffer overflow in the bufprint function in capiutil.c in libcapi, as used in Linux kernel 2.6.9 to 2.6.20 and isdn4k-utils, allows local users to cause a denial of service (crash) and possibly gain privileges via a crafted CAPI packet. IDENTIFIER = WIND00115958


Product Version

Linux Platforms 1.x

Downloads


Installation Notes

Installation Notes

WIND00116076.zip is for 1.5

1. Unzip the patch under [install_dir]/updates

2. Install the patch CD by entering the patch CD directory and run setup_linux.

3. This is a source only patch so you will have to build the kernel

4. Issue a make fs and make the kernel in a configured directory.

5. Upload the kernel and rootfs into the target and boot it up.


Live chat
Online