diff options
author | Michael Gilbert <mgilbert@debian.org> | 2013-06-02 19:53:38 +0000 |
---|---|---|
committer | Michael Gilbert <mgilbert@debian.org> | 2013-06-02 19:53:38 +0000 |
commit | 25d5720d5c6c82037b8b7fae823ae92399cfe272 (patch) | |
tree | f4c86c279dbb24215b00f76f9d79c75455269a76 /data/CVE/2002.list | |
parent | c336d45a514d4489f29bc14db50aaf5330ac2b77 (diff) |
gcc issue research
git-svn-id: svn+ssh://svn.debian.org/svn/secure-testing@22449 e39458fd-73e7-0310-bf30-c45bca0a0e42
Diffstat (limited to 'data/CVE/2002.list')
-rw-r--r-- | data/CVE/2002.list | 3 |
1 files changed, 3 insertions, 0 deletions
diff --git a/data/CVE/2002.list b/data/CVE/2002.list index 28e201f1f0..bd426e1e72 100644 --- a/data/CVE/2002.list +++ b/data/CVE/2002.list @@ -22,6 +22,9 @@ CVE-2002-2439 [wheezy] - gcc-4.4 <no-dsa> (Potentially affected apps need to be recompiled, if such issues are spotted in apps, these cases can be fixed on a case-by-case basis) - gcc-4.6 <unfixed> (low) [wheezy] - gcc-4.6 <no-dsa> (Potentially affected apps need to be recompiled, if such issues are spotted in apps, these cases can be fixed on a case-by-case basis) + - gcc-4.7 <unfixed> (low; bug #710380) + [wheezy] - gcc-4.7 <no-dsa> (Potentially affected apps need to be recompiled, if such issues are spotted in apps, these cases can be fixed on a case-by-case basis) + - gcc-4.8 4.8.0-1 (low) NOTE: Are there apps known to be exploitable through this? NOTE: Any application using unguarded memory allocation would be susceptible to DoS anyway? NOTE: This should be addressed in jessie by getting this fixed in gcc 4.7, so that the archive is |