diff options
author | Moritz Muehlenhoff <jmm@debian.org> | 2013-12-10 06:43:52 +0000 |
---|---|---|
committer | Moritz Muehlenhoff <jmm@debian.org> | 2013-12-10 06:43:52 +0000 |
commit | ddcb93c3897f7994ad8ed0fa63533cb262f41bbd (patch) | |
tree | 7d783cb3758457452215ae2ffd3b4be53379ad19 /retired/CVE-2013-0190 | |
parent | b6ffaf7859f72711ebfd995b1d83a5d09da3effe (diff) |
retire
git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@3171 e094ebfe-e918-0410-adfb-c712417f3574
Diffstat (limited to 'retired/CVE-2013-0190')
-rw-r--r-- | retired/CVE-2013-0190 | 11 |
1 files changed, 11 insertions, 0 deletions
diff --git a/retired/CVE-2013-0190 b/retired/CVE-2013-0190 new file mode 100644 index 00000000..c9c6943f --- /dev/null +++ b/retired/CVE-2013-0190 @@ -0,0 +1,11 @@ +Description: User-controllable kernel stack corruption on i386 under Xen +References: + http://www.openwall.com/lists/oss-security/2013/01/16/6 +Notes: +Bugs: +upstream: released (3.8-rc7) [9174adbee4a9a49d0139f5d71969852b36720809] +2.6.32-upstream-stable: ignored +sid: released (3.2.39-1) +2.6.32-squeeze-security: released (2.6.32-47) [bugfix/x86/xen-Fix-stack-corruption-in-xen_failsafe_callback-fo.patch] +3.2-upstream-stable: released (3.2.38) [5c0ce9fed10a58f65fe2784b664e03bdeaaac650] +3.2-wheezy-security: released (3.2.39-1) |