[kernel-sec-discuss] r3345 - active

Ben Hutchings benh at moszumanska.debian.org
Sun May 11 15:53:17 UTC 2014


Author: benh
Date: 2014-05-11 15:53:17 +0000 (Sun, 11 May 2014)
New Revision: 3345

Modified:
   active/CVE-2014-0181
   active/CVE-2014-0196
   active/CVE-2014-3122
Log:
Add Debian bug numbers to some recent CVEs

Modified: active/CVE-2014-0181
===================================================================
--- active/CVE-2014-0181	2014-05-10 21:02:47 UTC (rev 3344)
+++ active/CVE-2014-0181	2014-05-11 15:53:17 UTC (rev 3345)
@@ -1,7 +1,7 @@
 Description:  It is possible to reconfigure the network on Linux by calling write(2) on an appropriately connected netlink socket.  By passing such a socket as stdout or stderr to a setuid program, anyone can reconfigure the network.
 References:
 Notes:
-Bugs:
+Bugs: 746738
 upstream: released (3.15-rc5) [90f62cf30a78721641e08737bda787552428061e]
 2.6.32-upstream-stable:
 sid:

Modified: active/CVE-2014-0196
===================================================================
--- active/CVE-2014-0196	2014-05-10 21:02:47 UTC (rev 3344)
+++ active/CVE-2014-0196	2014-05-11 15:53:17 UTC (rev 3345)
@@ -1,7 +1,7 @@
 Description: n_tty_write buffer overflow when pty echoing in raw mode
 References: http://seclists.org/oss-sec/2014/q2/243
 Notes:
-Bugs:
+Bugs: 747166
 upstream: released (3.15-rc5) [4291086b1f081b869c6d79e5b7441633dc3ace00]
 2.6.32-upstream-stable:
 sid:

Modified: active/CVE-2014-3122
===================================================================
--- active/CVE-2014-3122	2014-05-10 21:02:47 UTC (rev 3344)
+++ active/CVE-2014-3122	2014-05-11 15:53:17 UTC (rev 3345)
@@ -1,7 +1,7 @@
 Description: DoS in memory management
 References:
 Notes:
-Bugs:
+Bugs: 747326
 upstream: released (3.15-rc1) [57e68e9cd65b4b8eb4045a1e0d0746458502554c]
 2.6.32-upstream-stable: needed
 sid: needed




More information about the kernel-sec-discuss mailing list