** Changed in: linux-flo (Ubuntu Xenial)
Status: New => Won't Fix
** Changed in: linux-mako (Ubuntu Xenial)
Status: New => Won't Fix
** Changed in: linux-flo (Ubuntu)
Status: New => Won't Fix
** Changed in: linux-goldfish (Ubuntu)
Status: New => Won't Fix
** Changed
** Changed in: linux-goldfish (Ubuntu Xenial)
Status: New => Won't Fix
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1555338
Title:
Linux netfilter IPT_SO_SET_REPLACE memory corruption
To
** Branch linked: lp:ubuntu/trusty-security/linux-lts-wily
** Branch linked: lp:ubuntu/trusty-updates/linux-lts-wily
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1555338
Title:
Linux netfilter
** Tags removed: verification-needed-xenial
** Tags added: verification-done-xenial
** Tags removed: verification-needed-precise verification-needed-trusty
verification-needed-vivid verification-needed-wily
** Tags added: verification-done-precise verification-done-trusty
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
precise' to 'verification-done-precise'.
If verification is not done by 5 working days
This bug was fixed in the package linux-raspi2 - 4.4.0-1016.22
---
linux-raspi2 (4.4.0-1016.22) xenial; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1595881
* Rebase against Ubuntu-4.4.0-28.47
[ Ubuntu: 4.4.0-28.47 ]
* Release Tracking Bug
- LP:
This bug was fixed in the package linux-raspi2 - 4.4.0-1016.22
---
linux-raspi2 (4.4.0-1016.22) xenial; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1595881
* Rebase against Ubuntu-4.4.0-28.47
[ Ubuntu: 4.4.0-28.47 ]
* Release Tracking Bug
- LP:
This bug was fixed in the package linux-snapdragon - 4.4.0-1019.22
---
linux-snapdragon (4.4.0-1019.22) xenial; urgency=low
[ Kamal Mostafa ]
* Release Tracking Bug
- LP: #1595882
[ Ubuntu: 4.4.0-28.47 ]
* Linux netfilter local privilege escalation issues (LP:
This bug was fixed in the package linux-snapdragon - 4.4.0-1019.22
---
linux-snapdragon (4.4.0-1019.22) xenial; urgency=low
[ Kamal Mostafa ]
* Release Tracking Bug
- LP: #1595882
[ Ubuntu: 4.4.0-28.47 ]
* Linux netfilter local privilege escalation issues (LP:
This bug was fixed in the package linux-raspi2 - 4.4.0-1016.22
---
linux-raspi2 (4.4.0-1016.22) xenial; urgency=low
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1595881
* Rebase against Ubuntu-4.4.0-28.47
[ Ubuntu: 4.4.0-28.47 ]
* Release Tracking Bug
- LP:
This bug was fixed in the package linux-snapdragon - 4.4.0-1019.22
---
linux-snapdragon (4.4.0-1019.22) xenial; urgency=low
[ Kamal Mostafa ]
* Release Tracking Bug
- LP: #1595882
[ Ubuntu: 4.4.0-28.47 ]
* Linux netfilter local privilege escalation issues (LP:
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
trusty' to 'verification-done-trusty'.
If verification is not done by 5 working days from
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
vivid' to 'verification-done-vivid'.
If verification is not done by 5 working days from
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
wily' to 'verification-done-wily'.
If verification is not done by 5 working days from
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
xenial' to 'verification-done-xenial'.
If verification is not done by 5 working days from
** Changed in: linux-snapdragon (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-snapdragon (Ubuntu Precise)
Importance: Undecided => High
** Changed in: linux-snapdragon (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-snapdragon (Ubuntu Wily)
** Also affects: linux (Ubuntu Yakkety)
Importance: High
Assignee: Tim Gardner (timg-tpi)
Status: Fix Released
** Also affects: linux-ti-omap4 (Ubuntu Yakkety)
Importance: High
Status: Invalid
** Also affects: linux-armadaxp (Ubuntu Yakkety)
Importance: High
** Changed in: linux-raspi2 (Ubuntu Xenial)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1555338
Title:
Linux netfilter IPT_SO_SET_REPLACE memory corruption
To
** Changed in: linux-manta (Ubuntu Xenial)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1555338
Title:
Linux netfilter IPT_SO_SET_REPLACE memory corruption
To manage
This bug was fixed in the package linux-lts-xenial - 4.4.0-14.30~14.04.2
---
linux-lts-xenial (4.4.0-14.30~14.04.2) trusty; urgency=low
* Release Tracking Bug (LP: #1558247)
* Current 4.4 kernel won't boot on powerpc (LP: #1557130)
- powerpc: Fix dedotify for binutils >=
** Changed in: linux-raspi2 (Ubuntu Wily)
Status: New => Fix Released
** Changed in: linux-lts-xenial (Ubuntu Trusty)
Status: Fix Released => New
** Changed in: linux-lts-xenial (Ubuntu Trusty)
Status: New => Invalid
--
You received this bug notification because you are a
This bug was fixed in the package linux-lts-xenial - 4.4.0-13.29~14.04.1
---
linux-lts-xenial (4.4.0-13.29~14.04.1) trusty; urgency=low
[ Tim Gardner ]
* Release Tracking Bug
- LP: #1556247
* s390/mm: four page table levels vs. fork (LP: #1556141)
- s390/mm: four page
This bug was fixed in the package linux - 4.4.0-13.29
---
linux (4.4.0-13.29) xenial; urgency=low
[ Tim Gardner ]
* Release Tracking Bug
- LP: #1556247
* s390/mm: four page table levels vs. fork (LP: #1556141)
- s390/mm: four page table levels vs. fork
* [Hyper-V]
This bug was fixed in the package linux-keystone - 3.13.0-53.78
---
linux-keystone (3.13.0-53.78) trusty; urgency=low
[ Ike Panhc ]
* Release Tracking Bug
- LP: #1555956
* Rebase to Ubuntu-3.13.0-83.127
[ Ubuntu: 3.13.0-83.127 ]
* Release Tracking Bug
- LP:
This bug was fixed in the package linux-armadaxp - 3.2.0-1664.88
---
linux-armadaxp (3.2.0-1664.88) precise; urgency=low
[ Ike Panhc ]
* Release Tracking Bug
- LP: #1555919
* Rebase to Ubuntu-3.2.0-101.141
[ Ubuntu: 3.2.0-101.141 ]
* Release Tracking Bug
- LP:
** Changed in: linux-lts-trusty (Ubuntu Precise)
Status: New => Fix Released
** Changed in: linux-lts-trusty (Ubuntu Precise)
Importance: Undecided => High
** Changed in: linux-lts-trusty (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-lts-trusty (Ubuntu Wily)
** Branch linked: lp:ubuntu/trusty-security/linux-lts-vivid
** Branch linked: lp:ubuntu/trusty-updates/linux-lts-vivid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1555338
Title:
Linux netfilter
This bug was fixed in the package linux - 3.13.0-83.127
---
linux (3.13.0-83.127) trusty; urgency=low
[ Brad Figg ]
* Release Tracking Bug
- LP: #1555839
[ Florian Westphal ]
* SAUCE: [nf,v2] netfilter: x_tables: don't rely on well-behaving
userspace
- LP:
This bug was fixed in the package linux-lts-utopic -
3.16.0-67.87~14.04.1
---
linux-lts-utopic (3.16.0-67.87~14.04.1) trusty; urgency=low
[ Brad Figg ]
* Release Tracking Bug
- LP: #1555847
[ Florian Westphal ]
* SAUCE: [nf,v2] netfilter: x_tables: don't rely on
This bug was fixed in the package linux - 3.19.0-56.62
---
linux (3.19.0-56.62) vivid; urgency=low
[ Brad Figg ]
* Release Tracking Bug
- LP: #1555832
[ Florian Westphal ]
* SAUCE: [nf,v2] netfilter: x_tables: don't rely on well-behaving
userspace
- LP:
This bug was fixed in the package linux - 3.2.0-101.141
---
linux (3.2.0-101.141) precise; urgency=low
[ Brad Figg ]
* Release Tracking Bug
- LP: #1555809
[ Florian Westphal ]
* SAUCE: [nf,v2] netfilter: x_tables: don't rely on well-behaving
userspace
- LP:
This bug was fixed in the package linux - 4.2.0-34.39
---
linux (4.2.0-34.39) wily; urgency=low
[ Brad Figg ]
* Release Tracking Bug
- LP: #1555821
[ Florian Westphal ]
* SAUCE: [nf] netfilter: x_tables: check for size overflow
- LP: #1555353
* SAUCE: [nf,v2]
This has been assigned CVE-2016-3134 ( http://www.openwall.com/lists
/oss-security/2016/03/14/1 ).
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-3134
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
** Branch linked: lp:ubuntu/trusty-proposed/linux-lts-xenial
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1555338
Title:
Linux netfilter IPT_SO_SET_REPLACE memory corruption
To manage
** Branch linked: lp:ubuntu/trusty-proposed/linux-lts-wily
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1555338
Title:
Linux netfilter IPT_SO_SET_REPLACE memory corruption
To manage notifications
** Branch linked: lp:ubuntu/trusty-proposed/linux-lts-vivid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1555338
Title:
Linux netfilter IPT_SO_SET_REPLACE memory corruption
To manage
** Also affects: linux-keystone (Ubuntu)
Importance: Undecided
Status: New
** Also affects: linux-armadaxp (Ubuntu)
Importance: Undecided
Status: New
** Changed in: linux-keystone (Ubuntu Xenial)
Status: New => Invalid
** Changed in: linux-keystone (Ubuntu Precise)
** Changed in: linux-lts-utopic (Ubuntu Trusty)
Status: In Progress => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1555338
Title:
Linux netfilter IPT_SO_SET_REPLACE memory
** Changed in: linux-lts-utopic (Ubuntu Trusty)
Importance: Undecided => Critical
** Changed in: linux (Ubuntu Wily)
Importance: Undecided => Critical
** Changed in: linux (Ubuntu Vivid)
Importance: Undecided => Critical
** Changed in: linux (Ubuntu Trusty)
Importance: Undecided =>
** Tags added: kernel-cve-skip-description
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1555338
Title:
Linux netfilter IPT_SO_SET_REPLACE memory corruption
To manage notifications about this bug
** Changed in: linux (Ubuntu Vivid)
Status: In Progress => Fix Committed
** Changed in: linux (Ubuntu Trusty)
Status: In Progress => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
** Changed in: linux (Ubuntu Wily)
Status: In Progress => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1555338
Title:
Linux netfilter IPT_SO_SET_REPLACE memory corruption
To
** Changed in: linux (Ubuntu Precise)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1555338
Title:
Linux netfilter IPT_SO_SET_REPLACE memory corruption
To
** Changed in: linux (Ubuntu Trusty)
Status: New => In Progress
** Changed in: linux (Ubuntu Trusty)
Assignee: (unassigned) => Chris J Arges (arges)
** Changed in: linux (Ubuntu Vivid)
Status: New => In Progress
** Changed in: linux-lts-utopic (Ubuntu Trusty)
Status:
v2 of the patch
http://thread.gmane.org/gmane.comp.security.firewalls.netfilter.devel/62150
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1555338
Title:
Linux netfilter IPT_SO_SET_REPLACE memory
** Changed in: linux (Ubuntu Vivid)
Status: In Progress => New
** Changed in: linux-lts-utopic (Ubuntu Trusty)
Status: In Progress => New
** Changed in: linux-lts-utopic (Ubuntu Trusty)
Assignee: Chris J Arges (arges) => (unassigned)
--
You received this bug notification
** Changed in: linux (Ubuntu Vivid)
Status: New => In Progress
** Changed in: linux (Ubuntu Vivid)
Assignee: (unassigned) => Chris J Arges (arges)
** Changed in: linux-lts-utopic (Ubuntu Trusty)
Status: New => In Progress
** Changed in: linux-lts-utopic (Ubuntu Trusty)
** Changed in: linux (Ubuntu Wily)
Status: New => In Progress
** Changed in: linux (Ubuntu Wily)
Assignee: (unassigned) => Chris J Arges (arges)
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
** Changed in: linux (Ubuntu Xenial)
Status: In Progress => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1555338
Title:
Linux netfilter IPT_SO_SET_REPLACE memory corruption
** Changed in: linux-lts-utopic (Ubuntu Xenial)
Status: New => Invalid
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1555338
Title:
Linux netfilter IPT_SO_SET_REPLACE memory corruption
To
** Also affects: linux (Ubuntu Wily)
Importance: Undecided
Status: New
** Also affects: linux (Ubuntu Vivid)
Importance: Undecided
Status: New
** Also affects: linux (Ubuntu Precise)
Importance: Undecided
Status: New
** Also affects: linux (Ubuntu Trusty)
** Also affects: linux (Ubuntu Xenial)
Importance: High
Status: Confirmed
** Changed in: linux (Ubuntu Xenial)
Status: Confirmed => In Progress
** Changed in: linux (Ubuntu Xenial)
Assignee: (unassigned) => Tim Gardner (timg-tpi)
--
You received this bug notification
upstream proposed fix: http://marc.info/?l=netfilter-
devel=145757134822741=2
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
53 matches
Mail list logo