diff options
author | Aaron Bauman <bman@gentoo.org> | 2016-04-26 17:02:29 +0900 |
---|---|---|
committer | Aaron Bauman <bman@gentoo.org> | 2016-04-26 17:13:03 +0900 |
commit | 4ab2af7dfe2c6eae4b79bef02c002aac71f59b16 (patch) | |
tree | 18d0b3801e9b37d70febf8b246237fe79d644756 /profiles | |
parent | package.mask: package version is no longer in the tree (diff) | |
download | gentoo-4ab2af7dfe2c6eae4b79bef02c002aac71f59b16.tar.gz gentoo-4ab2af7dfe2c6eae4b79bef02c002aac71f59b16.tar.bz2 gentoo-4ab2af7dfe2c6eae4b79bef02c002aac71f59b16.zip |
package.mask: package versions are no longer in the tree
Diffstat (limited to 'profiles')
-rw-r--r-- | profiles/package.mask | 20 |
1 files changed, 0 insertions, 20 deletions
diff --git a/profiles/package.mask b/profiles/package.mask index cfa90ff67788..b82ebdc23a9a 100644 --- a/profiles/package.mask +++ b/profiles/package.mask @@ -660,26 +660,6 @@ sys-block/afacli app-emulation/openstack-guest-agents-unix app-emulation/xe-guest-utilities -# Tom Wijsman <TomWij@gentoo.org> (6 Jun 2014) -# Mask gentoo-sources ebuilds that are affected with security bug CVE-2014-3153. -# -# Pinkie Pie discovered an issue in the futex subsystem that allows a -# local user to gain ring 0 control via the futex syscall. An -# unprivileged user could use this flaw to crash the kernel (resulting -# in denial of service) or for privilege escalation. -# -# https://bugs.gentoo.org/show_bug.cgi?id=CVE-2014-3153 -# Expires (6 Jun 2016) -=sys-kernel/gentoo-sources-3.2.58-r2 -~sys-kernel/gentoo-sources-3.4.90 -=sys-kernel/gentoo-sources-3.4.91 -~sys-kernel/gentoo-sources-3.10.40 -=sys-kernel/gentoo-sources-3.10.41 -~sys-kernel/gentoo-sources-3.12.20 -=sys-kernel/gentoo-sources-3.12.21 -~sys-kernel/gentoo-sources-3.14.4 -=sys-kernel/gentoo-sources-3.14.5 - # Hans de Graaff <graaff@gentoo.org> (1 Jun 2014) # Mask new rubinius version for testing. Current versions have some # issues that should be solved in the forthcoming rubinius 2.3 |