[Kernel-packages] [Bug 1739765] Re: xt_TCPMSS buffer overflow bug

2018-03-04 Thread Steve Beattie
Sorry, the kernel commit to fix this didn't pick up the launchpad bug number, so this bug didn't get auto-closed. It's been addressed in all Ubuntu releases e.g. https://usn.ubuntu.com/usn/usn-3583-1/ . You can see the state at

[Kernel-packages] [Bug 1739765] Re: xt_TCPMSS buffer overflow bug

2018-03-04 Thread Launchpad Bug Tracker
[Expired for linux (Ubuntu) because there has been no activity for 60 days.] ** Changed in: linux (Ubuntu) Status: Incomplete => Expired -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu.

[Kernel-packages] [Bug 1739765] Re: xt_TCPMSS buffer overflow bug

2018-01-03 Thread Denys Fedoryshchenko
Perfect! Thanks a lot, now i have big reason to ask some sysadmins and vendors to upgrade their kernels. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1739765 Title: xt_TCPMSS buffer

[Kernel-packages] [Bug 1739765] Re: xt_TCPMSS buffer overflow bug

2018-01-03 Thread Seth Arnold
Use CVE-2017-18017. Thanks ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-18017 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1739765 Title: xt_TCPMSS buffer

[Kernel-packages] [Bug 1739765] Re: xt_TCPMSS buffer overflow bug

2018-01-02 Thread Seth Arnold
Thanks Denys, I've asked MITRE for a CVE number for this issue. -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1739765 Title: xt_TCPMSS buffer overflow bug Status in linux package in

[Kernel-packages] [Bug 1739765] Re: xt_TCPMSS buffer overflow bug

2017-12-23 Thread Denys Fedoryshchenko
Yes, already queued by Eric Dumazet in all stable since report in April http://patchwork.ozlabs.org/patch/746618/ Yes, i did, but troubleshooting done and fix issued by Eric Dumazet. Also there is chance exist that someone used it for malicious purposes "in wild" at that moment, as it appeared

[Kernel-packages] [Bug 1739765] Re: xt_TCPMSS buffer overflow bug

2017-12-23 Thread Seth Arnold
Hello Denys, Are fixes for this bug available? Did you discover this bug? Have you, or someone else, filed for a CVE for this issue yet? Thanks ** Package changed: kernel-package (Ubuntu) => linux (Ubuntu) ** Information type changed from Private Security to Public Security ** Changed in: