From 350d0b006ed5121e65c413ea799ca621502105f3 Mon Sep 17 00:00:00 2001 From: Moritz Muehlenhoff Date: Wed, 10 Oct 2012 09:44:27 +0000 Subject: retire git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@2762 e094ebfe-e918-0410-adfb-c712417f3574 --- retired/CVE-2011-4077 | 14 ++++++++++++++ 1 file changed, 14 insertions(+) create mode 100644 retired/CVE-2011-4077 (limited to 'retired/CVE-2011-4077') diff --git a/retired/CVE-2011-4077 b/retired/CVE-2011-4077 new file mode 100644 index 00000000..a40c17e2 --- /dev/null +++ b/retired/CVE-2011-4077 @@ -0,0 +1,14 @@ +Description: xfs: potential buffer overflow in xfs_readlink() +References: + https://bugzilla.redhat.com/show_bug.cgi?id=749156 + http://oss.sgi.com/archives/xfs/2011-10/msg00345.html +Notes: + Proposed patch doesn't seem to fix the bug, due to possible integer + overflow. +Bugs: +upstream: released (3.2-rc2) [b52a360b2aa1c59ba9970fb0f52bbb093fcc7a24] +2.6.32-upstream-stable: released (2.6.32.60) +sid: released (3.0.0-6) [bugfix/all/xfs-fix-memory-corruption-in-xfs_readlink.patch, bugfix/all/xfs-fix-memory-corruption-in-xfs_readlink-2.patch] +2.6.26-lenny-security: released (2.6.26-28) [bugfix/all/xfs-fix-possible-memory-corruption-in-xfs_readlink.patch] +2.6.32-squeeze-security: released (2.6.32-39squeeze1) [bugfix/all/xfs-fix-possible-memory-corruption-in-xfs_readlink.patch] +3.2-upstream-stable: N/A -- cgit v1.2.3