** Changed in: linux (Ubuntu)
Status: Fix Committed => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1582864
Title:
use after free of BOS in
** Branch linked: lp:ubuntu/trusty-proposed/linux-lts-vivid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1582864
Title:
use after free of BOS in usb_reset_and_verify_device
Status in
** Branch linked: lp:ubuntu/trusty-updates/linux-lts-wily
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1582864
Title:
use after free of BOS in usb_reset_and_verify_device
Status in
This bug was fixed in the package linux - 3.19.0-64.72
---
linux (3.19.0-64.72) vivid; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1595976
[ Upstream Kernel Changes ]
* netfilter: x_tables: validate e->target_offset early
- LP: #1555338
-
This bug was fixed in the package linux - 4.2.0-41.48
---
linux (4.2.0-41.48) wily; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1595914
[ Upstream Kernel Changes ]
* netfilter: x_tables: validate e->target_offset early
- LP: #1555338
-
$ uname -a
Linux gerow0 4.2.0-39-generic #46~14.04.1-Ubuntu SMP Mon Jun 13 15:40:38 UTC
2016 x86_64 x86_64 x86_64 GNU/Linux
No oopses in wily, verified. Booting into vivid next.
** Tags removed: verification-needed-wily
** Tags added: verification-done-wily
--
You received this bug
$ uname -a
Linux gerow0 3.19.0-62-generic #70~14.04.1-Ubuntu SMP Mon Jun 13 16:30:31 UTC
2016 x86_64 x86_64 x86_64 GNU/Linux
No oopses in vivid either, verified.
** Tags removed: verification-needed-vivid
** Tags added: verification-done-vivid
--
You received this bug notification because you
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
vivid' to 'verification-done-vivid'.
If verification is not done by 5 working days from
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
wily' to 'verification-done-wily'.
If verification is not done by 5 working days from
This bug was fixed in the package linux - 3.13.0-87.133
---
linux (3.13.0-87.133) trusty; urgency=low
[ Kamal Mostafa ]
* Release Tracking Bug
- LP: #1585315
[ Upstream Kernel Changes ]
* Revert "usb: hub: do not clear BOS field during reset device"
- LP: #1582864
Looks good! Started with slub_debug and not seeing any Oopses when
uplugging usb3 storage.
$ uname -rsov
Linux 3.13.0-87-generic #133-Ubuntu SMP Tue May 24 18:32:09 UTC 2016 GNU/Linux
$ dmesg
...
[ 79.103213] usb 4-3: new SuperSpeed USB device number 2 using xhci_hcd
[ 79.121274] usb 4-3:
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
trusty' to 'verification-done-trusty'.
If verification is not done by 5 working days from
** Changed in: linux (Ubuntu)
Status: In Progress => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1582864
Title:
use after free of BOS in
It'd be helpful if this memory corruption regression could be
accelerated. It means that unplugging a USB3 device can mess up the
memory enough that file lookups that happen afterwards break if apparmor
is enabled - just because the allocation size is similar by chance. The
resulting oops is very
** Changed in: linux (Ubuntu Trusty)
Status: In Progress => Fix Committed
** Changed in: linux (Ubuntu Vivid)
Status: In Progress => Fix Committed
** Changed in: linux (Ubuntu Wily)
Status: In Progress => Fix Committed
--
You received this bug notification because you are
Excellent. Thanks for the prompt response!
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1582864
Title:
use after free of BOS in usb_reset_and_verify_device
Status in linux package in
Great, thanks for testing. I'll submit that commit to the appropriate
upstream kernels and SRU it to Ubuntu.
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1582864
Title:
use after
Nice, looks like it works for me!
$ uname -rsov
Linux 3.13.0-86-generic #131~lp1582864 SMP Tue May 17 20:16:27 UTC 2016
GNU/Linux
And here's my dmesg (previously I was getting an oops when unplugging my usb3
thumbdrive).
$ dmesg
...
[ 90.797829] usb 4-3: new SuperSpeed USB device number 2
This commit is in mainline as of: 4.5-rc6.
Per the commit message, this patch has already been included in several -stable
kernels:
4.5.0-rc4 (current git)
4.4.2
4.3.6 (currently in review)
4.1.18
3.18.27
3.14.61
This indicates that this commit is needed in Trusty(3.13),
** Also affects: linux (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: linux (Ubuntu Vivid)
Importance: Undecided
Status: New
** Changed in: linux (Ubuntu)
Status: Triaged => In Progress
** Changed in: linux (Ubuntu Trusty)
Status: Triaged =>
** Tags added: kernel-da.key
** Changed in: linux (Ubuntu)
Importance: Undecided => Medium
** Also affects: linux (Ubuntu Trusty)
Importance: Undecided
Status: New
** Changed in: linux (Ubuntu)
Status: Incomplete => Triaged
** Changed in: linux (Ubuntu Trusty)
21 matches
Mail list logo