diff options
author | Moritz Muehlenhoff <jmm@debian.org> | 2014-04-15 05:10:28 +0000 |
---|---|---|
committer | Moritz Muehlenhoff <jmm@debian.org> | 2014-04-15 05:10:28 +0000 |
commit | fe709455e177c028e087912da45a2b08975dc28d (patch) | |
tree | f876f3bb9082202c3aa33516fbb77c32fdf60caa /retired/CVE-2013-4483 | |
parent | f9c22d8f9d908e87004931d62ba0343c6104f113 (diff) |
retire
git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@3309 e094ebfe-e918-0410-adfb-c712417f3574
Diffstat (limited to 'retired/CVE-2013-4483')
-rw-r--r-- | retired/CVE-2013-4483 | 12 |
1 files changed, 12 insertions, 0 deletions
diff --git a/retired/CVE-2013-4483 b/retired/CVE-2013-4483 new file mode 100644 index 00000000..cd68f4e3 --- /dev/null +++ b/retired/CVE-2013-4483 @@ -0,0 +1,12 @@ +Description: ipc: ipc_rcu_putref refcount races +References: +Notes: + jmm> https://bugzilla.redhat.com/show_bug.cgi?id=1024854 claims RHEL kernels are + jmm> not affected, but the code seems to be present in all older kernels? +Bugs: +upstream: released (3.10) [6062a8dc0517bce23e3c2f7d2fea5e22411269a3] +2.6.32-upstream-stable: ignored "too intrusive to backport" +sid: released (3.10-1) +3.2-wheezy-security: released (3.2.57-1) [bugfix/all/ipc-msg-fix-race-around-refcount.patch] +2.6.32-squeeze-security: ignored "too intrusive to backport" +3.2-upstream-stable: released (3.2.57) [ipc-msg-fix-race-around-refcount.patch] |