CVE-2014-0181: Linux network reconfiguration due to incorrect netlink checks

Related Vulnerabilities: CVE-2014-0181  

Debian Bug report logs - #746738
CVE-2014-0181: Linux network reconfiguration due to incorrect netlink checks

version graph

Reported by: Henri Salo <henri@nerv.fi>

Date: Sat, 3 May 2014 05:57:02 UTC

Severity: important

Tags: fixed-upstream, security, upstream

Found in version linux/3.14.2-1

Fixed in version linux/3.14.9-1

Done: Salvatore Bonaccorso <carnil@debian.org>

Bug is archived. No further changes may be made.

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to debian-bugs-dist@lists.debian.org, Debian Kernel Team <debian-kernel@lists.debian.org>:
Bug#746738; Package src:linux. (Sat, 03 May 2014 05:57:06 GMT) (full text, mbox, link).


Acknowledgement sent to Henri Salo <henri@nerv.fi>:
New Bug report received and forwarded. Copy sent to Debian Kernel Team <debian-kernel@lists.debian.org>. (Sat, 03 May 2014 05:57:06 GMT) (full text, mbox, link).


Message #5 received at submit@bugs.debian.org (full text, mbox, reply):

From: Henri Salo <henri@nerv.fi>
To: submit@bugs.debian.org
Subject: CVE-2014-0181: Linux network reconfiguration due to incorrect netlink checks
Date: Sat, 3 May 2014 08:54:14 +0300
[Message part 1 (text/plain, inline)]
Source: linux
Version: 3.14.2-1
Severity: important
Tags: security, fixed-upstream

Please see for details:
http://www.openwall.com/lists/oss-security/2014/04/22/11
https://git.kernel.org/cgit/linux/kernel/git/davem/net.git/commit/?id=90f62cf30a78721641e08737bda787552428061e
https://git.kernel.org/cgit/linux/kernel/git/davem/net.git/commit/?id=78541c1dc60b65ecfce5a6a096fc260219d6784e

-- System Information:
Debian Release: jessie/sid
  APT prefers unstable
  APT policy: (500, 'unstable')
Architecture: amd64 (x86_64)

Kernel: Linux 3.9-1-amd64 (SMP w/2 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8) (ignored: LC_ALL set to en_US.UTF-8)
Shell: /bin/sh linked to /bin/dash
[signature.asc (application/pgp-signature, inline)]

Marked as fixed in versions linux/3.14.9-1. Request was from Salvatore Bonaccorso <carnil@debian.org> to control@bugs.debian.org. (Mon, 30 Jun 2014 19:48:05 GMT) (full text, mbox, link).


Marked Bug as done Request was from Salvatore Bonaccorso <carnil@debian.org> to control@bugs.debian.org. (Mon, 30 Jun 2014 19:48:06 GMT) (full text, mbox, link).


Notification sent to Henri Salo <henri@nerv.fi>:
Bug acknowledged by developer. (Mon, 30 Jun 2014 19:48:07 GMT) (full text, mbox, link).


Added tag(s) upstream. Request was from Salvatore Bonaccorso <carnil@debian.org> to control@bugs.debian.org. (Mon, 30 Jun 2014 19:48:10 GMT) (full text, mbox, link).


Message sent on to Henri Salo <henri@nerv.fi>:
Bug#746738. (Mon, 30 Jun 2014 19:48:14 GMT) (full text, mbox, link).


Message #16 received at 746738-submitter@bugs.debian.org (full text, mbox, reply):

From: Salvatore Bonaccorso <carnil@debian.org>
To: control@bugs.debian.org
Cc: 746738-submitter@bugs.debian.org
Subject: closing 746738
Date: Mon, 30 Jun 2014 21:45:06 +0200
close 746738 3.14.9-1
thanks

This was fixed with the linux/3.14.9-1 upload.




Bug archived. Request was from Debbugs Internal Request <owner@bugs.debian.org> to internal_control@bugs.debian.org. (Thu, 11 Sep 2014 07:32:51 GMT) (full text, mbox, link).


Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Wed Jun 19 13:24:42 2019; Machine Name: beach

Debian Bug tracking system

Debbugs is free software and licensed under the terms of the GNU Public License version 2. The current version can be obtained from https://bugs.debian.org/debbugs-source/.

Copyright © 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson, 2005-2017 Don Armstrong, and many other contributors.