Commit a6409cad authored by Luis Henriques's avatar Luis Henriques

UBUNTU: Ubuntu-4.4.0-28.47

Signed-off-by: default avatarLuis Henriques <luis.henriques@canonical.com>
parent ee32114e
linux (4.4.0-28.47) UNRELEASED; urgency=low
linux (4.4.0-28.47) xenial; urgency=low
CHANGELOG: Do not edit directly. Autogenerated at release.
CHANGELOG: Use the printchanges target to see the curent changes.
CHANGELOG: Use the insertchanges target to create the final log.
[ Luis Henriques ]
* Release Tracking Bug
- LP: #1595874
* Linux netfilter local privilege escalation issues (LP: #1595350)
- netfilter: x_tables: don't move to non-existent next rule
- netfilter: x_tables: validate targets of jumps
- netfilter: x_tables: add and use xt_check_entry_offsets
- netfilter: x_tables: kill check_entry helper
- netfilter: x_tables: assert minimum target size
- netfilter: x_tables: add compat version of xt_check_entry_offsets
- netfilter: x_tables: check standard target size too
- netfilter: x_tables: check for bogus target offset
- netfilter: x_tables: validate all offsets and sizes in a rule
- netfilter: x_tables: don't reject valid target size on some architectures
- netfilter: arp_tables: simplify translate_compat_table args
- netfilter: ip_tables: simplify translate_compat_table args
- netfilter: ip6_tables: simplify translate_compat_table args
- netfilter: x_tables: xt_compat_match_from_user doesn't need a retval
- netfilter: x_tables: do compat validation via translate_table
- netfilter: x_tables: introduce and use xt_copy_counters_from_user
* Linux netfilter IPT_SO_SET_REPLACE memory corruption (LP: #1555338)
- netfilter: x_tables: validate e->target_offset early
- netfilter: x_tables: make sure e->next_offset covers remaining blob size
- netfilter: x_tables: fix unconditional helper
-- Kamal Mostafa <kamal@canonical.com> Wed, 22 Jun 2016 06:45:00 -0700
-- Luis Henriques <luis.henriques@canonical.com> Fri, 24 Jun 2016 09:57:21 +0100
linux (4.4.0-27.46) xenial; urgency=low
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment