[kernel-sec-discuss] r4811 - active retired

Ben Hutchings benh at moszumanska.debian.org
Wed Dec 28 16:41:40 UTC 2016


Author: benh
Date: 2016-12-28 16:41:40 +0000 (Wed, 28 Dec 2016)
New Revision: 4811

Added:
   retired/CVE-2015-8967
Removed:
   active/CVE-2015-8967
Log:
Fill in status for CVE-2015-8967 and retire it


Deleted: active/CVE-2015-8967
===================================================================
--- active/CVE-2015-8967	2016-12-28 16:31:26 UTC (rev 4810)
+++ active/CVE-2015-8967	2016-12-28 16:41:40 UTC (rev 4811)
@@ -1,10 +0,0 @@
-Description:
-References:
-Notes:
-Bugs:
-upstream: released (4.0-rc1) [c623b33b4e9599c6ac5076f7db7369eb9869aa04]
-3.16-upstream-stable:
-3.2-upstream-stable:
-sid: released (4.0.2-1)
-3.16-jessie-security:
-3.2-wheezy-security:

Copied: retired/CVE-2015-8967 (from rev 4810, active/CVE-2015-8967)
===================================================================
--- retired/CVE-2015-8967	                        (rev 0)
+++ retired/CVE-2015-8967	2016-12-28 16:41:40 UTC (rev 4811)
@@ -0,0 +1,13 @@
+Description: arm64 syscall table is not read-only
+References:
+Notes:
+ bwh> This is not a security flaw in itself, but a missing mitigation.
+ bwh> Additionally, arm64 had no support for page protections in the
+ bwh> kernel mapping before 4.0, so this is impractical to backport.
+Bugs:
+upstream: released (4.0-rc1) [c623b33b4e9599c6ac5076f7db7369eb9869aa04]
+3.16-upstream-stable: ignored "Missing mitigation, impractical to backport"
+3.2-upstream-stable: N/A "Vulnerable architecture not present"
+sid: released (4.0.2-1)
+3.16-jessie-security: ignored "Missing mitigation, impractical to backport"
+3.2-wheezy-security: N/A "Vulnerable architecture not present"




More information about the kernel-sec-discuss mailing list