Bug 949932 (CVE-2013-1929)
Summary: | CVE-2013-1929 Kernel: tg3: buffer overflow in VPD firmware parsing | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Prasad Pandit <ppandit> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | low | Docs Contact: | |
Priority: | low | ||
Version: | unspecified | CC: | agordeev, anton, bhu, davej, dhoward, esammons, fhrbata, gansalmon, iboverma, itamar, jforbes, jkacur, jonathan, jwboyer, kernel-maint, kernel-mgr, lgoncalv, lwang, madhu.chinakonda, mcressma, plougher, pmatouse, rt-maint, rvrbovsk, williams |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2014-06-10 04:58:47 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 915516, 949939, 949940, 949942, 949943, 949944, 949945, 949946 | ||
Bug Blocks: | 949888 |
Description
Prasad Pandit
2013-04-09 10:13:46 UTC
Statement: This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5, 6 and Red Hat Enterprise MRG 2. The Red Hat Security Response Team has rated this issue as having low security impact because physical access is needed to exploit this issue. Future kernel updates for Red Hat Enterprise Linux 5, 6 and Red Hat Enterprise MRG 2 may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/. Created kernel tracking bugs for this issue Affects: fedora-all [bug 949946] kernel-3.8.6-203.fc18 has been pushed to the Fedora 18 stable repository. If problems still persist, please make note of it in this bug report. This issue has been addressed in following products: MRG for RHEL-6 v.2 Via RHSA-2013:0829 https://rhn.redhat.com/errata/RHSA-2013-0829.html This issue has been addressed in following products: Red Hat Enterprise Linux 5 Via RHSA-2013:1034 https://rhn.redhat.com/errata/RHSA-2013-1034.html This issue has been addressed in following products: Red Hat Enterprise Linux 6 Via RHSA-2013:1645 https://rhn.redhat.com/errata/RHSA-2013-1645.html |