[kernel-sec-discuss] r3345 - active
Ben Hutchings
benh at moszumanska.debian.org
Sun May 11 15:53:17 UTC 2014
Author: benh
Date: 2014-05-11 15:53:17 +0000 (Sun, 11 May 2014)
New Revision: 3345
Modified:
active/CVE-2014-0181
active/CVE-2014-0196
active/CVE-2014-3122
Log:
Add Debian bug numbers to some recent CVEs
Modified: active/CVE-2014-0181
===================================================================
--- active/CVE-2014-0181 2014-05-10 21:02:47 UTC (rev 3344)
+++ active/CVE-2014-0181 2014-05-11 15:53:17 UTC (rev 3345)
@@ -1,7 +1,7 @@
Description: It is possible to reconfigure the network on Linux by calling write(2) on an appropriately connected netlink socket. By passing such a socket as stdout or stderr to a setuid program, anyone can reconfigure the network.
References:
Notes:
-Bugs:
+Bugs: 746738
upstream: released (3.15-rc5) [90f62cf30a78721641e08737bda787552428061e]
2.6.32-upstream-stable:
sid:
Modified: active/CVE-2014-0196
===================================================================
--- active/CVE-2014-0196 2014-05-10 21:02:47 UTC (rev 3344)
+++ active/CVE-2014-0196 2014-05-11 15:53:17 UTC (rev 3345)
@@ -1,7 +1,7 @@
Description: n_tty_write buffer overflow when pty echoing in raw mode
References: http://seclists.org/oss-sec/2014/q2/243
Notes:
-Bugs:
+Bugs: 747166
upstream: released (3.15-rc5) [4291086b1f081b869c6d79e5b7441633dc3ace00]
2.6.32-upstream-stable:
sid:
Modified: active/CVE-2014-3122
===================================================================
--- active/CVE-2014-3122 2014-05-10 21:02:47 UTC (rev 3344)
+++ active/CVE-2014-3122 2014-05-11 15:53:17 UTC (rev 3345)
@@ -1,7 +1,7 @@
Description: DoS in memory management
References:
Notes:
-Bugs:
+Bugs: 747326
upstream: released (3.15-rc1) [57e68e9cd65b4b8eb4045a1e0d0746458502554c]
2.6.32-upstream-stable: needed
sid: needed
More information about the kernel-sec-discuss
mailing list