** Changed in: linux-lts-wily (Ubuntu Trusty)
       Status: New => Fix Committed

** Changed in: linux-lts-quantal (Ubuntu Precise)
       Status: New => Invalid

** Changed in: linux (Ubuntu Precise)
       Status: New => Fix Committed

** Changed in: linux (Ubuntu Wily)
       Status: New => Fix Committed

** Changed in: linux (Ubuntu Xenial)
       Status: New => Fix Committed

** Changed in: linux-ti-omap4 (Ubuntu Precise)
       Status: New => Fix Committed

** Changed in: linux-lts-saucy (Ubuntu Precise)
       Status: New => Invalid

** Changed in: linux-raspi2 (Ubuntu Wily)
       Status: New => Fix Committed

** Changed in: linux-lts-utopic (Ubuntu Trusty)
       Status: New => Fix Committed

** Description changed:

  The networking implementation in the Linux kernel through 4.3.3, as used
  in Android and other products, does not validate protocol identifiers
  for certain protocol families, which allows local users to cause a
  denial of service (NULL function pointer dereference and system crash)
  or possibly gain privileges by leveraging CLONE_NEWUSER support to
  execute a crafted SOCK_RAW application.
+ 
+ Break-Fix: - 79462ad02e861803b3840cc782248c7359451cd9

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1525570

Title:
  CVE-2015-8543

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1525570/+subscriptions

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to