** Changed in: linux-snapdragon (Ubuntu Xenial)
Status: New => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1555353
Title:
integer overflow in xt_alloc_ta
** Tags added: kernel-cve-tracking-bug
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1555353
Title:
integer overflow in xt_alloc_table_info
Status in linux package in Ubuntu:
** Changed in: linux-snapdragon (Ubuntu Precise)
Status: New => Invalid
** Changed in: linux-snapdragon (Ubuntu Precise)
Importance: Undecided => Medium
** Changed in: linux-snapdragon (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-snapdragon (Ubuntu Wily)
Importan
** Also affects: linux (Ubuntu Yakkety)
Importance: Medium
Assignee: Tim Gardner (timg-tpi)
Status: Fix Released
** Also affects: linux-ti-omap4 (Ubuntu Yakkety)
Importance: Medium
Status: Invalid
** Also affects: linux-armadaxp (Ubuntu Yakkety)
Importance: Medium
** Changed in: linux-manta (Ubuntu Xenial)
Status: New => Invalid
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1555353
Title:
integer overflow in xt_alloc_table_info
S
** Changed in: linux-raspi2 (Ubuntu Wily)
Status: New => Fix Released
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux-armadaxp in Ubuntu.
https://bugs.launchpad.net/bugs/1555353
Title:
integer overflow in xt_alloc_table_inf
This bug was fixed in the package linux-lts-xenial - 4.4.0-13.29~14.04.1
---
linux-lts-xenial (4.4.0-13.29~14.04.1) trusty; urgency=low
[ Tim Gardner ]
* Release Tracking Bug
- LP: #1556247
* s390/mm: four page table levels vs. fork (LP: #1556141)
- s390/mm: four page
This bug was fixed in the package linux - 4.4.0-13.29
---
linux (4.4.0-13.29) xenial; urgency=low
[ Tim Gardner ]
* Release Tracking Bug
- LP: #1556247
* s390/mm: four page table levels vs. fork (LP: #1556141)
- s390/mm: four page table levels vs. fork
* [Hyper-V] n
** Changed in: linux-lts-trusty (Ubuntu Wily)
Status: New => Invalid
** Changed in: linux-lts-trusty (Ubuntu Wily)
Importance: Undecided => Medium
** Changed in: linux-lts-trusty (Ubuntu Xenial)
Status: New => Invalid
** Changed in: linux-lts-trusty (Ubuntu Xenial)
Importance
This bug was fixed in the package linux - 4.2.0-34.39
---
linux (4.2.0-34.39) wily; urgency=low
[ Brad Figg ]
* Release Tracking Bug
- LP: #1555821
[ Florian Westphal ]
* SAUCE: [nf] netfilter: x_tables: check for size overflow
- LP: #1555353
* SAUCE: [nf,v2] netf
This has been assigned CVE-2016-3135 ( http://www.openwall.com/lists
/oss-security/2016/03/14/1 ).
** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-3135
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
** Branch linked: lp:ubuntu/trusty-proposed/linux-lts-xenial
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1555353
Title:
integer overflow in xt_alloc_table_info
Status in linux packag
** Branch linked: lp:ubuntu/trusty-proposed/linux-lts-wily
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1555353
Title:
integer overflow in xt_alloc_table_info
Status in linux package
** Tags added: kernel-cve-skip-description
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1555353
Title:
integer overflow in xt_alloc_table_info
Status in linux package in Ubuntu:
Fix
** Changed in: linux (Ubuntu Wily)
Status: In Progress => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1555353
Title:
integer overflow in xt_alloc_table_info
Stat
** Description changed:
+ [Impact]
+
[From https://code.google.com/p/google-security-
research/issues/detail?id=758 ]
A recent refactoring cof this codepath
(https://github.com/torvalds/linux/commit/2e4e6a17af35be359cc8f1c924f8f198fbd478cc)
introduced an integer overflow in xt_alloc
** Changed in: linux (Ubuntu Xenial)
Status: In Progress => Fix Committed
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1555353
Title:
integer overflow in xt_alloc_table_info
St
** Changed in: linux (Ubuntu Wily)
Assignee: (unassigned) => Chris J Arges (arges)
** Changed in: linux (Ubuntu Wily)
Status: New => In Progress
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.lau
** Also affects: linux (Ubuntu Xenial)
Importance: Undecided
Status: Confirmed
** Also affects: linux (Ubuntu Wily)
Importance: Undecided
Status: New
** Changed in: linux (Ubuntu Xenial)
Status: Confirmed => In Progress
** Changed in: linux (Ubuntu Xenial)
Assigne
Upstream proposed fix: http://marc.info/?l=netfilter-
devel&m=145757136822750&w=2
** Information type changed from Private Security to Public Security
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad
20 matches
Mail list logo