APPLIED[L/U]: [UBUNTU OEM-5.14, Jammy, HWE-5.17, Kinetic, OEM-6.0, Lunar, OEM-6.1, Unstable 0/1] CVE-2023-0179
Andrea Righi
andrea.righi at canonical.com
Fri Jan 20 06:17:52 UTC 2023
- Previous message (by thread): APPLIED [OEM-5.14/OEM-5.17/OEM-6.0/OEM-6.1] Re: [UBUNTU OEM-5.14, Jammy, HWE-5.17, Kinetic, OEM-6.0, Lunar, OEM-6.1, Unstable 0/1] CVE-2023-0179
- Next message (by thread): APPLIED[J/J:hwe-5.17/K]: [UBUNTU OEM-5.14, Jammy, HWE-5.17, Kinetic, OEM-6.0, Lunar, OEM-6.1, Unstable 0/1] CVE-2023-0179
- Messages sorted by:
[ date ]
[ thread ]
[ subject ]
[ author ]
On Wed, Jan 18, 2023 at 03:58:04PM -0300, Thadeu Lima de Souza Cascardo wrote:
> [Impact]
> An unprivileged user may escalate privileges by using netfilter VLAN support and
> user/network namespaces.
>
> [Testing]
> Could not reproduce with PoC at https://seclists.org/oss-sec/2023/q1/20.
>
> [Potential regression]
> netfilter rules may break.
Applied to lunar/linux and lunar/linux-unstable.
Thanks,
-Andrea
- Previous message (by thread): APPLIED [OEM-5.14/OEM-5.17/OEM-6.0/OEM-6.1] Re: [UBUNTU OEM-5.14, Jammy, HWE-5.17, Kinetic, OEM-6.0, Lunar, OEM-6.1, Unstable 0/1] CVE-2023-0179
- Next message (by thread): APPLIED[J/J:hwe-5.17/K]: [UBUNTU OEM-5.14, Jammy, HWE-5.17, Kinetic, OEM-6.0, Lunar, OEM-6.1, Unstable 0/1] CVE-2023-0179
- Messages sorted by:
[ date ]
[ thread ]
[ subject ]
[ author ]
More information about the kernel-team
mailing list