Linux netfilter local privilege escalation issues
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
linux (Ubuntu) |
Fix Released
|
Undecided
|
Unassigned |
Bug Description
The upstream stable rc git tree (http://
f24e230d257af1a
netfilter: x_tables: don't move to non-existent next rule
36472341017529e
netfilter: x_tables: validate targets of jumps
7d35812c3214afa
netfilter: x_tables: add and use xt_check_
aa412ba225dd3bc
netfilter: x_tables: kill check_entry helper
a08e4e190b86657
netfilter: x_tables: assert minimum target size
fc1221b3a163d13
netfilter: x_tables: add compat version of xt_check_
7ed2abddd20cf8f
netfilter: x_tables: check standard target size too
ce683e5f9d045e5
netfilter: x_tables: check for bogus target offset
13631bfc604161a
netfilter: x_tables: validate all offsets and sizes in a rule
7b7eba0f3515fca
netfilter: x_tables: don't reject valid target size on some architectures
8dddd32756f6fe8
netfilter: arp_tables: simplify translate_
7d3f843eed29222
netfilter: ip_tables: simplify translate_
329a0807124f12f
netfilter: ip6_tables: simplify translate_
0188346f21e6546
netfilter: x_tables: xt_compat_
09d9686047dbbe1
netfilter: x_tables: do compat validation via translate_table
d7591f0c41ce3e6
netfilter: x_tables: introduce and use xt_copy_
They have also been backported to the 4.4 (http://
bdf533de6968e96
netfilter: x_tables: validate e->target_offset early
6e94e0cfb0887e4
netfilter: x_tables: make sure e->next_offset covers remaining blob size
54d83fc74aa9ec7
netfilter: x_tables: fix unconditional helper
CRD: Public
description: | updated |
description: | updated |
information type: | Private Security → Public Security |
Changed in linux (Ubuntu): | |
status: | Incomplete → Confirmed |
This bug is missing log files that will aid in diagnosing the problem. From a terminal window please run:
apport-collect 1595350
and then change the status of the bug to 'Confirmed'.
If, due to the nature of the issue you have encountered, you are unable to run this command, please add a comment stating that fact and change the bug status to 'Confirmed'.
This change has been made by an automated script, maintained by the Ubuntu Kernel Team.