diff options
author | Moritz Muehlenhoff <jmm@debian.org> | 2013-02-27 15:04:02 +0000 |
---|---|---|
committer | Moritz Muehlenhoff <jmm@debian.org> | 2013-02-27 15:04:02 +0000 |
commit | 0c5209b98fda542978e2f787995a19ced1592064 (patch) | |
tree | 4f274ec5a1c2c81cddd49db5c643e4a352fbce6e /retired/CVE-2013-1772 | |
parent | cd0f92104e1cf22ec6427affbc670a53572d0264 (diff) |
new issue in logging (fixed in 3.2/sid, doesn't affect 2.6.32, so
resolved for all supported suites
git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@2836 e094ebfe-e918-0410-adfb-c712417f3574
Diffstat (limited to 'retired/CVE-2013-1772')
-rw-r--r-- | retired/CVE-2013-1772 | 10 |
1 files changed, 10 insertions, 0 deletions
diff --git a/retired/CVE-2013-1772 b/retired/CVE-2013-1772 new file mode 100644 index 00000000..e4f02ef0 --- /dev/null +++ b/retired/CVE-2013-1772 @@ -0,0 +1,10 @@ +Description: call_console_drivers() function log prefix stripping buffer overflow +References: + http://www.openwall.com/lists/oss-security/2013/02/26/3 +Notes: +Bugs: +upstream: released (3.5) [7ff9554bb578ba02166071d2d487b7fc7d860d62] +2.6.32-upstream-stable: N/A "exposed with commit 162a7e7500f9664636e649ba59defe541b7c2c60 from 3.0" +sid: released (3.2.39-1) +2.6.32-squeeze-security: N/A "exposed with commit 162a7e7500f9664636e649ba59defe541b7c2c60 from 3.0" +3.2-upstream-stable: released (3.2.38) |