[kernel-sec-discuss] r3473 - active retired

Ben Hutchings benh at moszumanska.debian.org
Tue Aug 26 23:14:05 UTC 2014


Author: benh
Date: 2014-08-26 23:14:05 +0000 (Tue, 26 Aug 2014)
New Revision: 3473

Added:
   retired/CVE-2014-0181
Removed:
   active/CVE-2014-0181
Log:
Retire CVE-2014-0181

Deleted: active/CVE-2014-0181
===================================================================
--- active/CVE-2014-0181	2014-08-26 23:13:00 UTC (rev 3472)
+++ active/CVE-2014-0181	2014-08-26 23:14:05 UTC (rev 3473)
@@ -1,10 +0,0 @@
-Description:  It is possible to reconfigure the network on Linux by calling write(2) on an appropriately connected netlink socket.  By passing such a socket as stdout or stderr to a setuid program, anyone can reconfigure the network.
-References:
-Notes:
-Bugs: 746738
-upstream: released (3.15-rc5) [90f62cf30a78721641e08737bda787552428061e, 5187cd055b6e81fc6526109456f8b20623148d5f, a53b72c83a4216f2eb883ed45a0cbce014b8e62d, a3b299da869d6e78cf42ae0b1b41797bcb8c5e4b, aa4cf9452f469f16cea8c96283b641b4576d4a7b]
-2.6.32-upstream-stable: ignored "too intrusive to backport"
-sid: released (3.14.9-1)
-3.2-wheezy-security: ignored "too intrusive to backport"
-2.6.32-squeeze-security: ignored "too intrusive to backport"
-3.2-upstream-stable: ignored "too intrusive to backport"

Copied: retired/CVE-2014-0181 (from rev 3472, active/CVE-2014-0181)
===================================================================
--- retired/CVE-2014-0181	                        (rev 0)
+++ retired/CVE-2014-0181	2014-08-26 23:14:05 UTC (rev 3473)
@@ -0,0 +1,10 @@
+Description:  It is possible to reconfigure the network on Linux by calling write(2) on an appropriately connected netlink socket.  By passing such a socket as stdout or stderr to a setuid program, anyone can reconfigure the network.
+References:
+Notes:
+Bugs: 746738
+upstream: released (3.15-rc5) [90f62cf30a78721641e08737bda787552428061e, 5187cd055b6e81fc6526109456f8b20623148d5f, a53b72c83a4216f2eb883ed45a0cbce014b8e62d, a3b299da869d6e78cf42ae0b1b41797bcb8c5e4b, aa4cf9452f469f16cea8c96283b641b4576d4a7b]
+2.6.32-upstream-stable: ignored "too intrusive to backport"
+sid: released (3.14.9-1)
+3.2-wheezy-security: ignored "too intrusive to backport"
+2.6.32-squeeze-security: ignored "too intrusive to backport"
+3.2-upstream-stable: ignored "too intrusive to backport"




More information about the kernel-sec-discuss mailing list