Format string vulnerability in the b43_request_firmware function in drivers/net/wireless/b43/main.c in the Broadcom B43 wireless driver in the Linux kernel through 3.9.4 allows local users to gain privileges by leveraging root access and including format string specifiers in an fwpostfix modprobe parameter, leading to improper construction of an error message.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
21 Nov 2024, 01:52
Type | Values Removed | Values Added |
---|---|---|
References | () http://git.kernel.org/cgit/linux/kernel/git/linville/wireless.git/commit/?id=9538cbaab6e8b8046039b4b2eb6c9d614dc782bd - | |
References | () http://lists.opensuse.org/opensuse-security-announce/2013-09/msg00003.html - | |
References | () http://lists.opensuse.org/opensuse-updates/2013-12/msg00129.html - | |
References | () http://rhn.redhat.com/errata/RHSA-2013-1051.html - | |
References | () http://rhn.redhat.com/errata/RHSA-2013-1450.html - | |
References | () http://www.debian.org/security/2013/dsa-2766 - | |
References | () http://www.openwall.com/lists/oss-security/2013/06/06/13 - | |
References | () http://www.ubuntu.com/usn/USN-1899-1 - | |
References | () http://www.ubuntu.com/usn/USN-1900-1 - | |
References | () http://www.ubuntu.com/usn/USN-1914-1 - | |
References | () http://www.ubuntu.com/usn/USN-1915-1 - | |
References | () http://www.ubuntu.com/usn/USN-1916-1 - | |
References | () http://www.ubuntu.com/usn/USN-1917-1 - | |
References | () http://www.ubuntu.com/usn/USN-1918-1 - | |
References | () http://www.ubuntu.com/usn/USN-1919-1 - | |
References | () http://www.ubuntu.com/usn/USN-1920-1 - | |
References | () http://www.ubuntu.com/usn/USN-1930-1 - | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=969518 - |
07 Nov 2023, 02:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://bugzilla.redhat.com/show_bug.cgi?id=969518 - | |
References | () http://www.ubuntu.com/usn/USN-1916-1 - | |
References | () http://rhn.redhat.com/errata/RHSA-2013-1450.html - | |
References | () http://www.ubuntu.com/usn/USN-1918-1 - | |
References | () http://www.ubuntu.com/usn/USN-1915-1 - | |
References | () http://www.debian.org/security/2013/dsa-2766 - | |
References | () http://www.ubuntu.com/usn/USN-1917-1 - | |
References | () http://www.ubuntu.com/usn/USN-1930-1 - | |
References | () http://www.ubuntu.com/usn/USN-1900-1 - | |
References | () http://lists.opensuse.org/opensuse-security-announce/2013-09/msg00003.html - | |
References | () http://www.ubuntu.com/usn/USN-1919-1 - | |
References | () http://www.ubuntu.com/usn/USN-1914-1 - | |
References | () http://lists.opensuse.org/opensuse-updates/2013-12/msg00129.html - | |
References | () http://rhn.redhat.com/errata/RHSA-2013-1051.html - | |
References | () http://www.ubuntu.com/usn/USN-1920-1 - | |
References | () http://www.ubuntu.com/usn/USN-1899-1 - | |
References | () http://www.openwall.com/lists/oss-security/2013/06/06/13 - | |
References | () http://git.kernel.org/cgit/linux/kernel/git/linville/wireless.git/commit/?id=9538cbaab6e8b8046039b4b2eb6c9d614dc782bd - |
11 Aug 2023, 18:14
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:linux:linux_kernel:3.9.2:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:3.9:rc2:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:3.9:rc1:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:3.9:rc5:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:3.9.0:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:3.9:rc3:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:3.9:rc7:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:3.9:rc6:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:3.9:rc4:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:3.9.3:*:*:*:*:*:*:* |
cpe:2.3:o:canonical:ubuntu_linux:13.04:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:12.10:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:* cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:10.04:*:*:*:-:*:*:* |
References | (UBUNTU) http://www.ubuntu.com/usn/USN-1915-1 - Third Party Advisory | |
References | (CONFIRM) https://bugzilla.redhat.com/show_bug.cgi?id=969518 - Issue Tracking, Third Party Advisory | |
References | (UBUNTU) http://www.ubuntu.com/usn/USN-1919-1 - Third Party Advisory | |
References | (SUSE) http://lists.opensuse.org/opensuse-security-announce/2013-09/msg00003.html - Mailing List, Third Party Advisory | |
References | (DEBIAN) http://www.debian.org/security/2013/dsa-2766 - Third Party Advisory | |
References | (REDHAT) http://rhn.redhat.com/errata/RHSA-2013-1450.html - Third Party Advisory | |
References | (UBUNTU) http://www.ubuntu.com/usn/USN-1920-1 - Third Party Advisory | |
References | (UBUNTU) http://www.ubuntu.com/usn/USN-1917-1 - Third Party Advisory | |
References | (UBUNTU) http://www.ubuntu.com/usn/USN-1930-1 - Third Party Advisory | |
References | (MLIST) http://www.openwall.com/lists/oss-security/2013/06/06/13 - Mailing List, Third Party Advisory | |
References | (UBUNTU) http://www.ubuntu.com/usn/USN-1918-1 - Third Party Advisory | |
References | (UBUNTU) http://www.ubuntu.com/usn/USN-1899-1 - Third Party Advisory | |
References | (UBUNTU) http://www.ubuntu.com/usn/USN-1914-1 - Third Party Advisory | |
References | (CONFIRM) http://git.kernel.org/cgit/linux/kernel/git/linville/wireless.git/commit/?id=9538cbaab6e8b8046039b4b2eb6c9d614dc782bd - Exploit, Patch, Vendor Advisory | |
References | (REDHAT) http://rhn.redhat.com/errata/RHSA-2013-1051.html - Third Party Advisory | |
References | (SUSE) http://lists.opensuse.org/opensuse-updates/2013-12/msg00129.html - Mailing List, Third Party Advisory | |
References | (UBUNTU) http://www.ubuntu.com/usn/USN-1900-1 - Third Party Advisory | |
References | (UBUNTU) http://www.ubuntu.com/usn/USN-1916-1 - Third Party Advisory | |
First Time |
Debian
Canonical ubuntu Linux Canonical Debian debian Linux |
Information
Published : 2013-06-07 14:03
Updated : 2024-11-21 01:52
NVD link : CVE-2013-2852
Mitre link : CVE-2013-2852
CVE.ORG link : CVE-2013-2852
JSON object : View
Products Affected
debian
- debian_linux
linux
- linux_kernel
canonical
- ubuntu_linux
CWE
CWE-134
Use of Externally-Controlled Format String