Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Fri, 6 Jun 2014 07:37:03 +0200 (CEST)
From: Thomas Gleixner <tglx@...utronix.de>
To: Solar Designer <solar@...nwall.com>
cc: oss-security@...ts.openwall.com
Subject: Re: Linux kernel futex local privilege escalation
 (CVE-2014-3153)

On Fri, 6 Jun 2014, Solar Designer wrote:

> I've added CC to Thomas.
> 
> On Thu, Jun 05, 2014 at 11:38:27PM -0400, Rich Felker wrote:
> > On Thu, Jun 05, 2014 at 06:45:45PM +0400, Solar Designer wrote:
> > > I've attached patches by Thomas Gleixner (four e-mails, in mbox format),
> > > as well as back-ports of those by John Johansen of Canonical, who wrote:
> > 
> > Maybe I'm missing something, but I can't find any statement of what
> > version these patches are intended to apply cleanly to. They don't
> > apply to latest stable.
> 
> Thomas - can you answer Rich's question?  This is about patches you sent
> on June 3 to linux-distros, which Kees then saved into an mbox file.

They should apply cleanly, if all stable tagged futex patches before
that are applied.

Thanks,

	Thomas

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ