APPLIED[J/J:hwe-5.17/K]: [UBUNTU OEM-5.14, Jammy, HWE-5.17, Kinetic, OEM-6.0, Lunar, OEM-6.1, Unstable 0/1] CVE-2023-0179

Luke Nowakowski-Krijger luke.nowakowskikrijger at canonical.com
Fri Jan 27 19:55:58 UTC 2023


Applied to jammy:linux , jammy:linux-hwe-5.17, and kinetic:linux
master-next

Thanks!
- Luke

On Wed, Jan 18, 2023 at 10:58 AM Thadeu Lima de Souza Cascardo <
cascardo at canonical.com> wrote:

> [Impact]
> An unprivileged user may escalate privileges by using netfilter VLAN
> support and
> user/network namespaces.
>
> [Testing]
> Could not reproduce with PoC at https://seclists.org/oss-sec/2023/q1/20.
>
> [Potential regression]
> netfilter rules may break.
>
> Pablo Neira Ayuso (1):
>   netfilter: nft_payload: incorrect arithmetics when fetching VLAN
>     header bits
>
>  net/netfilter/nft_payload.c | 2 +-
>  1 file changed, 1 insertion(+), 1 deletion(-)
>
> --
> 2.34.1
>
>
> --
> kernel-team mailing list
> kernel-team at lists.ubuntu.com
> https://lists.ubuntu.com/mailman/listinfo/kernel-team
>
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.ubuntu.com/archives/kernel-team/attachments/20230127/aa85049e/attachment.html>


More information about the kernel-team mailing list