*** This bug is a duplicate of bug 1325941 ***
https://bugs.launchpad.net/bugs/1325941
** Information type changed from Public to Public Security
** Tags added: amd64 testcase
** CVE removed: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2014-3917
** This bug has been marked a duplicat
** Changed in: linux (Ubuntu Trusty)
Status: New => Fix Committed
** Changed in: linux (Ubuntu)
Status: Confirmed => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1302605
T
Attaching patch that is being sent to Kernel Team by e-mail.
** Description changed:
+ SRU Justification:
+
+ Impact: Calls to /libx32/ld-linux-x32.so.2 hang when using auditd
+ Fix: Upstream, a3c54931199565930d6d84f4c3456f6440aefd41
+ Testcase: Comment #7
+
+ Old Description:
+
I'm running
** Tags added: ua
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1302605
Title:
Calls to /libx32/ld-linux-x32.so.2 hang when using auditd
To manage notifications about this bug go to:
https://bugs.l
CVE-2014-3917 has been assigned to this issue: http://seclists.org/oss-
sec/2014/q2/377
Another proposed patch for this has been posted here:
http://article.gmane.org/gmane.linux.kernel/1713179 — This one adds a
guard around the array access but also drops syscall auditing for x32
calls.
** CVE a
** Tags added: patch
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1302605
Title:
Calls to /libx32/ld-linux-x32.so.2 hang when using auditd
To manage notifications about this bug go to:
https://bug
Yeah, that brown paper bag was my fault. Thanks Launchpad for white-
space dammaging the patch so I hand applied it in the wrong place. Bah.
New kernels for test, with an updated patch included. If you could test
and report. Thanks.
--
You received this bug notification because you are a memb
Ok I have applied the patch as proposed to a test kernel. Could you
test the kernels at the URL below and confirm they do fix things for
you:
http://people.canonical.com/~apw/lp1302605-trusty/
Please report any testing back here.
--
You received this bug notification because you are a memb
** Package changed: eglibc (Ubuntu) => linux (Ubuntu)
** Also affects: linux (Ubuntu Trusty)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1302605
Title: