summaryrefslogtreecommitdiffstats
path: root/retired/CVE-2013-0190
diff options
context:
space:
mode:
authorMoritz Muehlenhoff <jmm@debian.org>2013-12-10 06:43:52 +0000
committerMoritz Muehlenhoff <jmm@debian.org>2013-12-10 06:43:52 +0000
commitddcb93c3897f7994ad8ed0fa63533cb262f41bbd (patch)
tree7d783cb3758457452215ae2ffd3b4be53379ad19 /retired/CVE-2013-0190
parentb6ffaf7859f72711ebfd995b1d83a5d09da3effe (diff)
retire
git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@3171 e094ebfe-e918-0410-adfb-c712417f3574
Diffstat (limited to 'retired/CVE-2013-0190')
-rw-r--r--retired/CVE-2013-019011
1 files changed, 11 insertions, 0 deletions
diff --git a/retired/CVE-2013-0190 b/retired/CVE-2013-0190
new file mode 100644
index 00000000..c9c6943f
--- /dev/null
+++ b/retired/CVE-2013-0190
@@ -0,0 +1,11 @@
+Description: User-controllable kernel stack corruption on i386 under Xen
+References:
+ http://www.openwall.com/lists/oss-security/2013/01/16/6
+Notes:
+Bugs:
+upstream: released (3.8-rc7) [9174adbee4a9a49d0139f5d71969852b36720809]
+2.6.32-upstream-stable: ignored
+sid: released (3.2.39-1)
+2.6.32-squeeze-security: released (2.6.32-47) [bugfix/x86/xen-Fix-stack-corruption-in-xen_failsafe_callback-fo.patch]
+3.2-upstream-stable: released (3.2.38) [5c0ce9fed10a58f65fe2784b664e03bdeaaac650]
+3.2-wheezy-security: released (3.2.39-1)

© 2014-2024 Faster IT GmbH | imprint | privacy policy