diff options
author | Michael Gilbert <mgilbert@debian.org> | 2013-06-02 19:53:38 +0000 |
---|---|---|
committer | Michael Gilbert <mgilbert@debian.org> | 2013-06-02 19:53:38 +0000 |
commit | 5cb47f6daaf68f1138142b87617299789e614af3 (patch) | |
tree | 803878a8aab17416c437cfd1ca4e97e9f737ca65 /data/CVE/list.2002 | |
parent | e5d59ac25099a3c63f5114dff8f8d2933ccf4397 (diff) |
gcc issue research
git-svn-id: svn+ssh://svn.debian.org/svn/secure-testing@22449 e39458fd-73e7-0310-bf30-c45bca0a0e42
Diffstat (limited to 'data/CVE/list.2002')
-rw-r--r-- | data/CVE/list.2002 | 3 |
1 files changed, 3 insertions, 0 deletions
diff --git a/data/CVE/list.2002 b/data/CVE/list.2002 index 28e201f1f0..bd426e1e72 100644 --- a/data/CVE/list.2002 +++ b/data/CVE/list.2002 @@ -22,6 +22,9 @@ CVE-2002-2439 [wheezy] - gcc-4.4 <no-dsa> (Potentially affected apps need to be recompiled, if such issues are spotted in apps, these cases can be fixed on a case-by-case basis) - gcc-4.6 <unfixed> (low) [wheezy] - gcc-4.6 <no-dsa> (Potentially affected apps need to be recompiled, if such issues are spotted in apps, these cases can be fixed on a case-by-case basis) + - gcc-4.7 <unfixed> (low; bug #710380) + [wheezy] - gcc-4.7 <no-dsa> (Potentially affected apps need to be recompiled, if such issues are spotted in apps, these cases can be fixed on a case-by-case basis) + - gcc-4.8 4.8.0-1 (low) NOTE: Are there apps known to be exploitable through this? NOTE: Any application using unguarded memory allocation would be susceptible to DoS anyway? NOTE: This should be addressed in jessie by getting this fixed in gcc 4.7, so that the archive is |