** Description changed: This issue: https://github.com/torvalds/linux/commit/b29c457a6511435960115c0f548c4360d5f4801d + + + [Impact] + Data corruption and/or leak. + + [Fix] + Zero out entire data structure beforehand + + + [Test] + Boot-test only so far. + + [Regression Potential] + Possible effect on iptables/nftables. Though considered minimal risk as the patch has only a very localized effect and is accepted upstream in v5.12
** Also affects: linux (Ubuntu) Importance: Undecided Status: New ** No longer affects: kernel-sru-workflow ** Also affects: linux (Ubuntu Hirsute) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Focal) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Bionic) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Groovy) Importance: Undecided Status: New -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1927682 Title: netfilter: x_tables: fix compat match/target pad out-of-bound write To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1927682/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs