diff options
author | Moritz Muehlenhoff <jmm@debian.org> | 2012-10-10 09:44:27 +0000 |
---|---|---|
committer | Moritz Muehlenhoff <jmm@debian.org> | 2012-10-10 09:44:27 +0000 |
commit | 350d0b006ed5121e65c413ea799ca621502105f3 (patch) | |
tree | ee645f08d7ad182348c0ec032d5c05ca6f9abf22 /retired/CVE-2011-4077 | |
parent | fb0bf8fa9820141e48906dba5e7d1fbabac82b95 (diff) |
retire
git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@2762 e094ebfe-e918-0410-adfb-c712417f3574
Diffstat (limited to 'retired/CVE-2011-4077')
-rw-r--r-- | retired/CVE-2011-4077 | 14 |
1 files changed, 14 insertions, 0 deletions
diff --git a/retired/CVE-2011-4077 b/retired/CVE-2011-4077 new file mode 100644 index 00000000..a40c17e2 --- /dev/null +++ b/retired/CVE-2011-4077 @@ -0,0 +1,14 @@ +Description: xfs: potential buffer overflow in xfs_readlink() +References: + https://bugzilla.redhat.com/show_bug.cgi?id=749156 + http://oss.sgi.com/archives/xfs/2011-10/msg00345.html +Notes: + Proposed patch doesn't seem to fix the bug, due to possible integer + overflow. +Bugs: +upstream: released (3.2-rc2) [b52a360b2aa1c59ba9970fb0f52bbb093fcc7a24] +2.6.32-upstream-stable: released (2.6.32.60) +sid: released (3.0.0-6) [bugfix/all/xfs-fix-memory-corruption-in-xfs_readlink.patch, bugfix/all/xfs-fix-memory-corruption-in-xfs_readlink-2.patch] +2.6.26-lenny-security: released (2.6.26-28) [bugfix/all/xfs-fix-possible-memory-corruption-in-xfs_readlink.patch] +2.6.32-squeeze-security: released (2.6.32-39squeeze1) [bugfix/all/xfs-fix-possible-memory-corruption-in-xfs_readlink.patch] +3.2-upstream-stable: N/A |