diff options
author | dann frazier <dannf@debian.org> | 2006-11-08 16:19:36 +0000 |
---|---|---|
committer | dann frazier <dannf@debian.org> | 2006-11-08 16:19:36 +0000 |
commit | f65e43219c1817431bc679f0b6505bc649e3b3a0 (patch) | |
tree | 61503d04bce128eb77062f17d269879d5b435ce6 /retired/CVE-2006-4342 | |
parent | 1675f178ec1f9c42fff41fb48aff6106f1618154 (diff) |
retiring CVE-2006-4342
git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@631 e094ebfe-e918-0410-adfb-c712417f3574
Diffstat (limited to 'retired/CVE-2006-4342')
-rw-r--r-- | retired/CVE-2006-4342 | 22 |
1 files changed, 22 insertions, 0 deletions
diff --git a/retired/CVE-2006-4342 b/retired/CVE-2006-4342 new file mode 100644 index 00000000..1f3d94f0 --- /dev/null +++ b/retired/CVE-2006-4342 @@ -0,0 +1,22 @@ +Candidate: CVE-2006-4342 +References: + https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=205618 +Description: + The kernel in Red Hat Enterprise Linux 3, when running on SMP + systems, allows local users to cause a denial of service (deadlock) + by running the shmat function on an shm at the same time that shmctl + is removing that shm (IPC_RMID), which prevents a spinlock from being + unlocked. +Ubuntu-Description: +Notes: + dannf> not reproducible on sarge/2.6.8/amd64/4xCPU, issue supposedly + dannf> doesn't affect upstream 2.4, only in RH 2.4 due to 2.5 backport +Bugs: +upstream: N/A +linux-2.6: N/A +2.6.8-sarge-security: N/A +2.4.27-sarge-security: N/A +2.6.10-hoary-security: N/A +2.6.12-breezy-security: N/A +2.6.15-dapper-security: N/A +2.6.17-edgy: N/A |