Explain the seccomp fix properly
svn path=/dists/sid/linux/; revision=21443
This commit is contained in:
parent
58b54a1127
commit
678d260cd1
|
@ -224,7 +224,8 @@ linux (3.14.7-1) UNRELEASED; urgency=medium
|
||||||
- udeb: Add packages based on ppc64 configuration
|
- udeb: Add packages based on ppc64 configuration
|
||||||
* netfilter: ipv4: defrag: set local_df flag on defragmented skb
|
* netfilter: ipv4: defrag: set local_df flag on defragmented skb
|
||||||
(regression in 3.14.5)
|
(regression in 3.14.5)
|
||||||
* [mips] asm: thread_info: Add _TIF_SECCOMP flag (Closes: #751417)
|
* [mips] seccomp: Check system calls whenever seccomp is enabled,
|
||||||
|
even if audit and trace are disabled (Closes: #751417)
|
||||||
* auditsc: audit_krule mask accesses need bounds checking (CVE-2014-3917)
|
* auditsc: audit_krule mask accesses need bounds checking (CVE-2014-3917)
|
||||||
* fs,userns: Change inode_capable to capable_wrt_inode_uidgid
|
* fs,userns: Change inode_capable to capable_wrt_inode_uidgid
|
||||||
(CVE-2014-4014)
|
(CVE-2014-4014)
|
||||||
|
|
Loading…
Reference in New Issue