CVE-2007-1357
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
11/04/2007
Last modified:
09/04/2025
Description
The atalk_sum_skb function in AppleTalk for Linux kernel 2.6.x before 2.6.21, and possibly 2.4.x, allows remote attackers to cause a denial of service (crash) via an AppleTalk frame that is shorter than the specified length, which triggers a BUG_ON call when an attempt is made to perform a checksum.
Impact
Base Score 2.0
7.80
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* | 2.6.20.4 (including) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://lists.suse.com/archive/suse-security-announce/2007-May/0001.html
- http://secunia.com/advisories/24793
- http://secunia.com/advisories/24901
- http://secunia.com/advisories/25078
- http://secunia.com/advisories/25099
- http://secunia.com/advisories/25226
- http://secunia.com/advisories/25392
- http://secunia.com/advisories/25683
- http://secunia.com/advisories/25691
- http://secunia.com/advisories/25714
- http://secunia.com/advisories/25961
- http://www.debian.org/security/2007/dsa-1286
- http://www.debian.org/security/2007/dsa-1304
- http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.20.5
- http://www.novell.com/linux/security/advisories/2007_30_kernel.html
- http://www.novell.com/linux/security/advisories/2007_35_kernel.html
- http://www.novell.com/linux/security/advisories/2007_43_kernel.html
- http://www.securityfocus.com/archive/1/471457
- http://www.securityfocus.com/bid/23376
- http://www.ubuntu.com/usn/usn-464-1
- http://www.vupen.com/english/advisories/2007/1340
- https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=235857
- https://issues.rpath.com/browse/RPL-1244
- http://lists.suse.com/archive/suse-security-announce/2007-May/0001.html
- http://secunia.com/advisories/24793
- http://secunia.com/advisories/24901
- http://secunia.com/advisories/25078
- http://secunia.com/advisories/25099
- http://secunia.com/advisories/25226
- http://secunia.com/advisories/25392
- http://secunia.com/advisories/25683
- http://secunia.com/advisories/25691
- http://secunia.com/advisories/25714
- http://secunia.com/advisories/25961
- http://www.debian.org/security/2007/dsa-1286
- http://www.debian.org/security/2007/dsa-1304
- http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.20.5
- http://www.novell.com/linux/security/advisories/2007_30_kernel.html
- http://www.novell.com/linux/security/advisories/2007_35_kernel.html
- http://www.novell.com/linux/security/advisories/2007_43_kernel.html
- http://www.securityfocus.com/archive/1/471457
- http://www.securityfocus.com/bid/23376
- http://www.ubuntu.com/usn/usn-464-1
- http://www.vupen.com/english/advisories/2007/1340
- https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=235857
- https://issues.rpath.com/browse/RPL-1244



