{
  "threat_severity" : "Low",
  "public_date" : "2013-06-06T00:00:00Z",
  "bugzilla" : {
    "description" : "kernel: b43: format string leaking into error msgs",
    "id" : "969518",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=969518"
  },
  "cvss" : {
    "cvss_base_score" : "6.0",
    "cvss_scoring_vector" : "AV:L/AC:H/Au:S/C:C/I:C/A:C",
    "status" : "verified"
  },
  "details" : [ "Format string vulnerability in the b43_request_firmware function in drivers/net/wireless/b43/main.c in the Broadcom B43 wireless driver in the Linux kernel through 3.9.4 allows local users to gain privileges by leveraging root access and including format string specifiers in an fwpostfix modprobe parameter, leading to improper construction of an error message." ],
  "statement" : "This issue does not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 5.\nThis issue does affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 6, and Red Hat Enterprise MRG. Future updates for Red Hat Enterprise Linux 6 and Red Hat Enterprise MRG may address this issue.",
  "acknowledgement" : "Red Hat would like to thank Kees Cook for reporting this issue.",
  "affected_release" : [ {
    "product_name" : "OpenStack 3 for RHEL 6",
    "release_date" : "2013-07-16T00:00:00Z",
    "advisory" : "RHSA-2013:1080",
    "cpe" : "cpe:/a:redhat:openstack:3::el6",
    "package" : "kernel-0:2.6.32-358.114.1.openstack.el6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 6",
    "release_date" : "2013-07-16T00:00:00Z",
    "advisory" : "RHSA-2013:1051",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6",
    "package" : "kernel-0:2.6.32-358.14.1.el6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 6.3 EUS - Server and Compute Node Only",
    "release_date" : "2013-10-22T00:00:00Z",
    "advisory" : "RHSA-2013:1450",
    "cpe" : "cpe:/o:redhat:rhel_eus:6.3",
    "package" : "kernel-0:2.6.32-279.37.2.el6"
  }, {
    "product_name" : "Red Hat Enterprise MRG 2",
    "release_date" : "2013-09-16T00:00:00Z",
    "advisory" : "RHSA-2013:1264",
    "cpe" : "cpe:/a:redhat:enterprise_mrg:2:server:el6",
    "package" : "kernel-rt-0:3.6.11.5-rt37.55.el6rt"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Enterprise Linux 5",
    "fix_state" : "Not affected",
    "package_name" : "kernel",
    "cpe" : "cpe:/o:redhat:enterprise_linux:5"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7",
    "fix_state" : "Not affected",
    "package_name" : "kernel",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2013-2852\nhttps://nvd.nist.gov/vuln/detail/CVE-2013-2852" ],
  "name" : "CVE-2013-2852",
  "csaw" : false
}