Format string vulnerability in the b43_request_firmware function in drivers/net/wireless/b43/main.c in the Broadcom B43 wireless driver in the Linux kernel through 3.9.4 allows local users to gain privileges by leveraging root access and including format string specifiers in an fwpostfix modprobe parameter, leading to improper construction of an error message.
https://bugzilla.redhat.com/show_bug.cgi?id=969518
http://www.ubuntu.com/usn/USN-1930-1
http://www.ubuntu.com/usn/USN-1920-1
http://www.ubuntu.com/usn/USN-1919-1
http://www.ubuntu.com/usn/USN-1918-1
http://www.ubuntu.com/usn/USN-1917-1
http://www.ubuntu.com/usn/USN-1916-1
http://www.ubuntu.com/usn/USN-1915-1
http://www.ubuntu.com/usn/USN-1914-1
http://www.ubuntu.com/usn/USN-1900-1
http://www.ubuntu.com/usn/USN-1899-1
http://www.openwall.com/lists/oss-security/2013/06/06/13
http://www.debian.org/security/2013/dsa-2766
http://rhn.redhat.com/errata/RHSA-2013-1450.html
http://rhn.redhat.com/errata/RHSA-2013-1051.html
http://lists.opensuse.org/opensuse-updates/2013-12/msg00129.html
http://lists.opensuse.org/opensuse-security-announce/2013-09/msg00003.html