Summary: |
CVE-2013-4391 systemd: Integer overflow, leading to heap-based buffer overflow by processing native messages |
Product: |
[Other] Security Response
|
Reporter: |
Jan Lieskovsky <jlieskov> |
Component: |
vulnerability | Assignee: |
Red Hat Product Security <security-response-team> |
Status: |
CLOSED
CURRENTRELEASE
|
QA Contact: |
|
Severity: |
medium
|
Docs Contact: |
|
Priority: |
medium
|
|
|
Version: |
unspecified | CC: |
bressers, fweimer, jrusnack, lpoetter, mmcallis, security-response-team
|
Target Milestone: |
--- | Keywords: |
Security |
Target Release: |
--- | |
|
Hardware: |
All | |
|
OS: |
Linux | |
|
Whiteboard: |
impact=moderate,public=20130923,reported=20120919,source=redhat,cvss2=4.6/AV:L/AC:L/Au:N/C:P/I:P/A:P,cwe=CWE-190->CWE-122,fedora-all/systemd=notaffected,rhel-7/systemd=notaffected |
Fixed In Version:
|
|
Doc Type:
|
Bug Fix |
Doc Text:
|
|
Story Points:
|
--- |
Clone Of:
|
|
Environment:
|
|
Last Closed:
|
2014-02-12 01:07:51 EST
|
Type:
|
--- |
Regression:
|
--- |
Mount Type:
|
--- |
Documentation:
|
--- |
CRM:
|
|
Verified Versions:
|
|
Category:
|
--- |
oVirt Team:
|
--- |
RHEL 7.3 requirements from Atomic Host:
|
|
Cloudforms Team:
|
--- |
| |
Bug Depends On: |
858746
|
|
|
Bug Blocks: |
859151
|
|
|