This bug was fixed in the package linux - 3.13.0-168.218
---
linux (3.13.0-168.218) trusty; urgency=medium
* linux: 3.13.0-168.218 -proposed tracker (LP: #1819663)
* CVE-2019-9213
- mm: enforce min addr even if capable() in expand_downwards()
* CVE-2019-3460
-
Tested on linux-generic 3.13.0.168.179 from trusty-proposed. Tried
reproducing according to test case from description, and verified that
ixgbe is fixed:
# uname -r
3.13.0-168-generic
# apt-cache madison linux-generic
linux-generic | 3.13.0.168.179 |
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
trusty' to 'verification-done-trusty'. If the problem still exists,
change the tag
** Changed in: linux (Ubuntu Trusty)
Status: In Progress => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1815501
Title:
ixgbe: Kernel Oops when attempting to disable spoofchk
SRUv2 sent to kernel-team mailing list:
https://lists.ubuntu.com/archives/kernel-team/2019-February/098451.htm
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1815501
Title:
ixgbe: Kernel Oops when
SRU request sent to kernel-team mailing list:
https://lists.ubuntu.com/archives/kernel-team/2019-February/098444.html
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1815501
Title:
ixgbe: Kernel Oops
** Also affects: linux (Ubuntu Trusty)
Importance: Undecided
Status: New
** Changed in: linux (Ubuntu Trusty)
Status: New => In Progress
** Changed in: linux (Ubuntu Trusty)
Importance: Undecided => Medium
** Changed in: linux (Ubuntu Trusty)
Assignee: (unassigned) =>