summaryrefslogtreecommitdiffstats
path: root/retired/CVE-2011-4077
diff options
context:
space:
mode:
authorMoritz Muehlenhoff <jmm@debian.org>2012-10-10 09:44:27 +0000
committerMoritz Muehlenhoff <jmm@debian.org>2012-10-10 09:44:27 +0000
commit350d0b006ed5121e65c413ea799ca621502105f3 (patch)
treeee645f08d7ad182348c0ec032d5c05ca6f9abf22 /retired/CVE-2011-4077
parentfb0bf8fa9820141e48906dba5e7d1fbabac82b95 (diff)
retire
git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@2762 e094ebfe-e918-0410-adfb-c712417f3574
Diffstat (limited to 'retired/CVE-2011-4077')
-rw-r--r--retired/CVE-2011-407714
1 files changed, 14 insertions, 0 deletions
diff --git a/retired/CVE-2011-4077 b/retired/CVE-2011-4077
new file mode 100644
index 00000000..a40c17e2
--- /dev/null
+++ b/retired/CVE-2011-4077
@@ -0,0 +1,14 @@
+Description: xfs: potential buffer overflow in xfs_readlink()
+References:
+ https://bugzilla.redhat.com/show_bug.cgi?id=749156
+ http://oss.sgi.com/archives/xfs/2011-10/msg00345.html
+Notes:
+ Proposed patch doesn't seem to fix the bug, due to possible integer
+ overflow.
+Bugs:
+upstream: released (3.2-rc2) [b52a360b2aa1c59ba9970fb0f52bbb093fcc7a24]
+2.6.32-upstream-stable: released (2.6.32.60)
+sid: released (3.0.0-6) [bugfix/all/xfs-fix-memory-corruption-in-xfs_readlink.patch, bugfix/all/xfs-fix-memory-corruption-in-xfs_readlink-2.patch]
+2.6.26-lenny-security: released (2.6.26-28) [bugfix/all/xfs-fix-possible-memory-corruption-in-xfs_readlink.patch]
+2.6.32-squeeze-security: released (2.6.32-39squeeze1) [bugfix/all/xfs-fix-possible-memory-corruption-in-xfs_readlink.patch]
+3.2-upstream-stable: N/A

© 2014-2024 Faster IT GmbH | imprint | privacy policy