[kernel-sec-discuss] r5776 - active

Ben Hutchings benh at moszumanska.debian.org
Sat Dec 9 18:57:57 UTC 2017


Author: benh
Date: 2017-12-09 18:57:56 +0000 (Sat, 09 Dec 2017)
New Revision: 5776

Modified:
   active/CVE-2017-1000405
Log:
Mark CVE-2017-1000405 as N/A for 3.2 branches

Modified: active/CVE-2017-1000405
===================================================================
--- active/CVE-2017-1000405	2017-12-09 18:35:11 UTC (rev 5775)
+++ active/CVE-2017-1000405	2017-12-09 18:57:56 UTC (rev 5776)
@@ -6,12 +6,14 @@
  carnil> The upstream commit 8310d48b125d19fcd9521d83b8293e63eb1646aa
  carnil> allows the race condition, and was backported to 3.2.87,
  carnil> 3.16.42 and 4.9.7.
+ bwh> But in 3.2 dirty bits didn't work on s390, so the backported version of
+ bwh> can_follow_write_pmd() doesn't use them.
 Bugs:
 upstream: released (4.15-rc2) [a8f97366452ed491d13cf1e44241bc0b5740b1f0]
 4.9-upstream-stable: released (4.9.67) [7031ae2ab37d3df53c4a4e9903329a5d38c745ec]
 3.16-upstream-stable: needed
-3.2-upstream-stable: needed
+3.2-upstream-stable: N/A "Vulnerable code not present"
 sid: released (4.14.2-1) [bugfix/all/mm-thp-Do-not-make-page-table-dirty-unconditionally-.patch]
 4.9-stretch-security: released (4.9.65-1)
 3.16-jessie-security: released (3.16.51-1)
-3.2-wheezy-security: needed
+3.2-wheezy-security: N/A "Vulnerable code not present"




More information about the kernel-sec-discuss mailing list