summaryrefslogtreecommitdiffstats
path: root/retired/CVE-2013-4592
diff options
context:
space:
mode:
authorMoritz Muehlenhoff <jmm@debian.org>2014-06-04 14:26:36 +0000
committerMoritz Muehlenhoff <jmm@debian.org>2014-06-04 14:26:36 +0000
commitf9e128eb1c5003b0a19ab2b061a96d0131865d22 (patch)
tree9cb532a8437d4415f99f97354a1e1877d57153a9 /retired/CVE-2013-4592
parente82a020162c65cfa9c2e4dbc78fb51ece77df0d9 (diff)
retire
git-svn-id: svn+ssh://svn.debian.org/svn/kernel-sec@3364 e094ebfe-e918-0410-adfb-c712417f3574
Diffstat (limited to 'retired/CVE-2013-4592')
-rw-r--r--retired/CVE-2013-459210
1 files changed, 10 insertions, 0 deletions
diff --git a/retired/CVE-2013-4592 b/retired/CVE-2013-4592
new file mode 100644
index 00000000..960e61e4
--- /dev/null
+++ b/retired/CVE-2013-4592
@@ -0,0 +1,10 @@
+Description: KVM: DoS through unreclaimable memory
+References:
+Notes:
+Bugs:
+upstream: released (3.8) [e40f193f5bb022e927a57a4f5d5194e4f12ddb74, 12d6e7538e2d418c08f082b1b44ffa5fb7270ed8]
+2.6.32-upstream-stable: ignored "too intrusive to backport"
+sid: released (3.8-1)
+3.2-wheezy-security: released (3.2.53-1) [bugfix/all/KVM-perform-an-invalid-memslot-step-for-gpa-base-cha.patch, bugfix/all/KVM-Fix-iommu-map-unmap-to-handle-memory-slot-moves.patch]
+2.6.32-squeeze-security: ignored "too intrusive to backport"
+3.2-upstream-stable: released (3.2.54)

© 2014-2024 Faster IT GmbH | imprint | privacy policy