summaryrefslogtreecommitdiffstats
path: root/retired/CVE-2013-4483
diff options
context:
space:
mode:
authorMoritz Muehlenhoff <jmm@debian.org>2014-04-15 05:10:28 +0000
committerMoritz Muehlenhoff <jmm@debian.org>2014-04-15 05:10:28 +0000
commitfe709455e177c028e087912da45a2b08975dc28d (patch)
treef876f3bb9082202c3aa33516fbb77c32fdf60caa /retired/CVE-2013-4483
parentf9c22d8f9d908e87004931d62ba0343c6104f113 (diff)
retire
git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@3309 e094ebfe-e918-0410-adfb-c712417f3574
Diffstat (limited to 'retired/CVE-2013-4483')
-rw-r--r--retired/CVE-2013-448312
1 files changed, 12 insertions, 0 deletions
diff --git a/retired/CVE-2013-4483 b/retired/CVE-2013-4483
new file mode 100644
index 00000000..cd68f4e3
--- /dev/null
+++ b/retired/CVE-2013-4483
@@ -0,0 +1,12 @@
+Description: ipc: ipc_rcu_putref refcount races
+References:
+Notes:
+ jmm> https://bugzilla.redhat.com/show_bug.cgi?id=1024854 claims RHEL kernels are
+ jmm> not affected, but the code seems to be present in all older kernels?
+Bugs:
+upstream: released (3.10) [6062a8dc0517bce23e3c2f7d2fea5e22411269a3]
+2.6.32-upstream-stable: ignored "too intrusive to backport"
+sid: released (3.10-1)
+3.2-wheezy-security: released (3.2.57-1) [bugfix/all/ipc-msg-fix-race-around-refcount.patch]
+2.6.32-squeeze-security: ignored "too intrusive to backport"
+3.2-upstream-stable: released (3.2.57) [ipc-msg-fix-race-around-refcount.patch]

© 2014-2024 Faster IT GmbH | imprint | privacy policy