This bug is missing log files that will aid in diagnosing the problem.
While running an Ubuntu kernel (not a mainline or third-party kernel)
please enter the following command in a terminal window:

apport-collect 1829055

and then change the status of the bug to 'Confirmed'.

If, due to the nature of the issue you have encountered, you are unable
to run this command, please add a comment stating that fact and change
the bug status to 'Confirmed'.

This change has been made by an automated script, maintained by the
Ubuntu Kernel Team.

** Changed in: linux (Ubuntu)
       Status: New => Incomplete

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1829055

Title:
  CVE-2019-11815

Status in linux package in Ubuntu:
  Incomplete
Status in linux package in Debian:
  Fix Released

Bug description:
  An issue was discovered in rds_tcp_kill_sock in net/rds/tcp.c in the
  Linux kernel before 5.0.8. There is a race condition leading to a use-
  after-free, related to net namespace cleanup.

  This is a remotely exploitable bug, and seems to be relevant for all
  current versions of ubuntu, including LTS ones.

  Debian CVE : https://security-
  tracker.debian.org/tracker/CVE-2019-11815

  Fixed by:
  https://git.kernel.org/linus/cb66ddd156203daefb8d71158036b27b0e2caf63

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1829055/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to     : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to