On Wed, Jan 07, 2015 at 11:11:32AM -0600, William Hubbs wrote:
> On Wed, Jan 07, 2015 at 11:21:56AM -0500, Mike Pagano wrote:
> > On Tue, Jan 06, 2015 at 05:47:10PM -0600, William Hubbs wrote:
> > > All,
> > > #
> > > # Pinkie Pie discovered an issue in the futex subsystem that allows a
> > > # local user to gain ring 0 control via the futex syscall. An
> > > # unprivileged user could use this flaw to crash the kernel (resulting
> > > # in denial of service) or for privilege escalation.
> > > #
> > > # https://bugs.gentoo.org/show_bug.cgi?id=CVE-2014-3153
> > > =sys-kernel/gentoo-sources-3.2.58-r2
> > > ~sys-kernel/gentoo-sources-3.4.90
> > > =sys-kernel/gentoo-sources-3.4.91
> > > ~sys-kernel/gentoo-sources-3.10.40
> > > =sys-kernel/gentoo-sources-3.10.41
> > > ~sys-kernel/gentoo-sources-3.12.20
> > > =sys-kernel/gentoo-sources-3.12.21
> > > ~sys-kernel/gentoo-sources-3.14.4
> > > =sys-kernel/gentoo-sources-3.14.5
> 
> Mike,
> 
> since you responded here, what do you think about this p.mask entry?
> Should we keep these in the tree?
 
William,

At what point do we not care about users who have not upgraded and will
miss this security message? 

Mike


-- 
Mike Pagano
Gentoo Developer - Kernel Project
Gentoo Sources - Lead 
E-Mail     : mpag...@gentoo.org
GnuPG FP   : EEE2 601D 0763 B60F 848C  9E14 3C33 C650 B576 E4E3
Public Key : http://pgp.mit.edu:11371/pks/lookup?search=0xB576E4E3&op=index

Reply via email to