This bug was fixed in the package linux-oem-osp1 - 5.0.0-1065.70
---
linux-oem-osp1 (5.0.0-1065.70) bionic; urgency=medium
* bionic/linux-oem-osp1: 5.0.0-1065.70 -proposed tracker (LP:
#1887090)
[ Ubuntu: 5.0.0-58.62 ]
* disco/linux: 5.0.0-58.62 -proposed tracker (LP: #1887094
This bug was fixed in the package linux - 5.4.0-42.46
---
linux (5.4.0-42.46) focal; urgency=medium
* focal/linux: 5.4.0-42.46 -proposed tracker (LP: #1887069)
* linux 4.15.0-109-generic network DoS regression vs -108 (LP: #1886668)
- SAUCE: Revert "netprio_cgroup: Fix unlimi
This bug was fixed in the package linux-oem-osp1 - 5.0.0-1065.70
---
linux-oem-osp1 (5.0.0-1065.70) bionic; urgency=medium
* bionic/linux-oem-osp1: 5.0.0-1065.70 -proposed tracker (LP:
#1887090)
[ Ubuntu: 5.0.0-58.62 ]
* disco/linux: 5.0.0-58.62 -proposed tracker (LP: #1887094
This bug was fixed in the package linux - 5.3.0-64.58
---
linux (5.3.0-64.58) eoan; urgency=medium
* eoan/linux: 5.3.0-64.58 -proposed tracker (LP: #1887088)
* linux 4.15.0-109-generic network DoS regression vs -108 (LP: #1886668)
- SAUCE: Revert "netprio_cgroup: Fix unlimite
This bug was fixed in the package linux - 4.4.0-186.216
---
linux (4.4.0-186.216) xenial; urgency=medium
* xenial/linux: 4.4.0-186.216 -proposed tracker (LP: #1885514)
* Xenial update: v4.4.228 upstream stable release (LP: #1884564)
- ipv6: fix IPV6_ADDRFORM operation logic
This bug was fixed in the package linux - 4.15.0-112.113
---
linux (4.15.0-112.113) bionic; urgency=medium
* bionic/linux: 4.15.0-112.113 -proposed tracker (LP: #1887048)
* Packaging resync (LP: #1786013)
- update dkms package versions
* CVE-2020-11935
- SAUCE: aufs: d
This bug was fixed in the package linux - 5.4.0-42.46
---
linux (5.4.0-42.46) focal; urgency=medium
* focal/linux: 5.4.0-42.46 -proposed tracker (LP: #1887069)
* linux 4.15.0-109-generic network DoS regression vs -108 (LP: #1886668)
- SAUCE: Revert "netprio_cgroup: Fix unlimi
Tested against -proposed kernels for xenial, bionic, eoan, and focal.
Tested against a suite of tests I wrote to exercise as many of the
interfaces as possible which are restricted by kernel lockdown, and also
tested against the applicable "American Unsigned Language" exploits [1].
Everything looks
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
xenial' to 'verification-done-xenial'. If the problem still exists,
change the tag 'verifica
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
bionic' to 'verification-done-bionic'. If the problem still exists,
change the tag 'verifica
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
focal' to 'verification-done-focal'. If the problem still exists, change
the tag 'verificati
** Also affects: linux-oem-osp1 (Ubuntu)
Importance: Undecided
Status: New
** No longer affects: linux-oem-osp1 (Ubuntu Xenial)
** No longer affects: linux-oem-osp1 (Ubuntu Eoan)
** No longer affects: linux-oem-osp1 (Ubuntu Focal)
** Changed in: linux-oem-osp1 (Ubuntu)
Status:
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
eoan' to 'verification-done-eoan'. If the problem still exists, change
the tag 'verification
** Changed in: linux (Ubuntu Eoan)
Status: In Progress => Fix Committed
** Changed in: linux (Ubuntu Focal)
Status: In Progress => Fix Committed
** Changed in: linux (Ubuntu Bionic)
Status: In Progress => Fix Committed
** Changed in: linux (Ubuntu Xenial)
Status: In P
** Description changed:
Impact: The lockdown patches have evolved over time, and part of this
was restricting more areas of the kernel. Not all of these additions
were backported, and some can lead to lockdown bypasses, see [1] and
[2].
Fix: Backport newer lockdown restrictions to old
15 matches
Mail list logo