[kernel-sec-discuss] r5776 - active
Ben Hutchings
benh at moszumanska.debian.org
Sat Dec 9 18:57:57 UTC 2017
Author: benh
Date: 2017-12-09 18:57:56 +0000 (Sat, 09 Dec 2017)
New Revision: 5776
Modified:
active/CVE-2017-1000405
Log:
Mark CVE-2017-1000405 as N/A for 3.2 branches
Modified: active/CVE-2017-1000405
===================================================================
--- active/CVE-2017-1000405 2017-12-09 18:35:11 UTC (rev 5775)
+++ active/CVE-2017-1000405 2017-12-09 18:57:56 UTC (rev 5776)
@@ -6,12 +6,14 @@
carnil> The upstream commit 8310d48b125d19fcd9521d83b8293e63eb1646aa
carnil> allows the race condition, and was backported to 3.2.87,
carnil> 3.16.42 and 4.9.7.
+ bwh> But in 3.2 dirty bits didn't work on s390, so the backported version of
+ bwh> can_follow_write_pmd() doesn't use them.
Bugs:
upstream: released (4.15-rc2) [a8f97366452ed491d13cf1e44241bc0b5740b1f0]
4.9-upstream-stable: released (4.9.67) [7031ae2ab37d3df53c4a4e9903329a5d38c745ec]
3.16-upstream-stable: needed
-3.2-upstream-stable: needed
+3.2-upstream-stable: N/A "Vulnerable code not present"
sid: released (4.14.2-1) [bugfix/all/mm-thp-Do-not-make-page-table-dirty-unconditionally-.patch]
4.9-stretch-security: released (4.9.65-1)
3.16-jessie-security: released (3.16.51-1)
-3.2-wheezy-security: needed
+3.2-wheezy-security: N/A "Vulnerable code not present"
More information about the kernel-sec-discuss
mailing list