Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Sat, 7 Jun 2014 19:40:56 +0000
From: mancha <mancha1@...o.com>
To: oss-security@...ts.openwall.com
Cc: Solar Designer <solar@...nwall.com>
Subject: Re: Linux kernel futex local privilege escalation
 (CVE-2014-3153)

On Fri, Jun 06, 2014 at 07:37:03AM +0200, Thomas Gleixner wrote:
> 
> They should apply cleanly, if all stable tagged futex patches before
> that are applied.

I've placed a consolidated CVE-2014-3153 patch for 3.10.x at:

http://sf.net/projects/mancha/files/sec/linux-3.10.41_CVE-2014-3153.diff

Note: applies with trivial offsets to <3.10.37 due to f26c70a4.

--mancha


[ CONTENT OF TYPE application/pgp-signature SKIPPED ]

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ