Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20140607194056.GA2871@zoho.com>
Date: Sat, 7 Jun 2014 19:40:56 +0000
From: mancha <mancha1@...o.com>
To: oss-security@...ts.openwall.com
Cc: Solar Designer <solar@...nwall.com>
Subject: Re: Linux kernel futex local privilege escalation
 (CVE-2014-3153)

On Fri, Jun 06, 2014 at 07:37:03AM +0200, Thomas Gleixner wrote:
> 
> They should apply cleanly, if all stable tagged futex patches before
> that are applied.

I've placed a consolidated CVE-2014-3153 patch for 3.10.x at:

http://sf.net/projects/mancha/files/sec/linux-3.10.41_CVE-2014-3153.diff

Note: applies with trivial offsets to <3.10.37 due to f26c70a4.

--mancha


Content of type "application/pgp-signature" skipped

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.