Please read this before reporting a bug:
https://wiki.archlinux.org/title/Bug_reporting_guidelines
Do NOT report bugs when a package is just outdated, or it is in the AUR. Use the 'flag out of date' link on the package page, or the Mailing List.
REPEAT: Do NOT report bugs for outdated packages!
https://wiki.archlinux.org/title/Bug_reporting_guidelines
Do NOT report bugs when a package is just outdated, or it is in the AUR. Use the 'flag out of date' link on the package page, or the Mailing List.
REPEAT: Do NOT report bugs for outdated packages!
FS#40321 - [linux] n_tty: Fix n_tty_write crash when echoing in raw mode
Attached to Project:
Arch Linux
Opened by Peter Weber (hoschi) - Monday, 12 May 2014, 11:46 GMT
Last edited by Tobias Powalowski (tpowa) - Monday, 12 May 2014, 19:53 GMT
Opened by Peter Weber (hoschi) - Monday, 12 May 2014, 11:46 GMT
Last edited by Tobias Powalowski (tpowa) - Monday, 12 May 2014, 19:53 GMT
|
DetailsDescription:
Security vulnerability in the Linux-Kernel, allows users to gain higher rights. I read, that this only affects x86_64, but can't test this. The patch doesn't seem to apply to a specific architectur, so I leave it on "all". Additional info: * package version(s): kernel >= 2.6.31-rc3 * upstream patch: https://git.kernel.org/cgit/linux/kernel/git/gregkh/tty.git/commit/?h=tty-linus&id=4291086b1 * other sources: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0196 |
This task depends upon
Closed by Tobias Powalowski (tpowa)
Monday, 12 May 2014, 19:53 GMT
Reason for closing: Fixed
Additional comments about closing: 3.14.3-2
Monday, 12 May 2014, 19:53 GMT
Reason for closing: Fixed
Additional comments about closing: 3.14.3-2