[Bug 1634496] Re: proc_keys_show crash when reading /proc/keys
** Changed in: linux Status: Confirmed => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1634496 Title: proc_keys_show crash when reading /proc/keys To manage notifications about this bug go to: https://bugs.launchpad.net/linux/+bug/1634496/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1634496] Re: proc_keys_show crash when reading /proc/keys
Launchpad has imported 9 comments from the remote bug at https://bugzilla.redhat.com/show_bug.cgi?id=1373966. If you reply to an imported comment from within Launchpad, your comment will be sent to the remote bug automatically. Read more about Launchpad's inter-bugtracker facilities at https://help.launchpad.net/InterBugTracking. On 2016-09-07T14:48:59+00:00 Adam wrote: It was found that when gcc stack protector is turned on, proc_keys_show() can cause a panic due to stack corruption. This happens because xbuf[] is not big enough to hold a 64-bit timeout rendered as weeks. Product bug: https://bugzilla.redhat.com/show_bug.cgi?id=1373499 Reply at: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1634496/comments/0 On 2016-09-07T14:49:03+00:00 Adam wrote: Acknowledgments: Name: Ondrej Kozina (Red Hat) Reply at: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1634496/comments/1 On 2016-09-12T13:40:18+00:00 Vladis wrote: Statement: This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 5. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/. This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 6, 7 and Red Hat Enterprise MRG-2. Future Linux kernel updates for the respective releases might address this issue. Reply at: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1634496/comments/2 On 2016-09-12T13:42:25+00:00 Vladis wrote: Created attachment 1200212 Fix for buffer overflow in proc_keys_show Reply at: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1634496/comments/3 On 2016-10-13T12:31:14+00:00 Vladis wrote: cve-id CVE-2016-7042 was assigned to this flaw internally by the Red Hat. please, use it in the public communications regarding this flaw. Reply at: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1634496/comments/4 On 2017-03-21T13:14:56+00:00 errata-xmlrpc wrote: This issue has been addressed in the following products: Red Hat Enterprise Linux 6 Via RHSA-2017:0817 https://rhn.redhat.com/errata/RHSA-2017-0817.html Reply at: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1634496/comments/14 On 2017-08-01T19:09:29+00:00 errata-xmlrpc wrote: This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2017:2077 https://access.redhat.com/errata/RHSA-2017:2077 Reply at: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1634496/comments/15 On 2017-08-02T07:48:19+00:00 errata-xmlrpc wrote: This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2017:1842 https://access.redhat.com/errata/RHSA-2017:1842 Reply at: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1634496/comments/16 On 2017-09-06T20:38:04+00:00 errata-xmlrpc wrote: This issue has been addressed in the following products: Red Hat Enterprise MRG 2 Via RHSA-2017:2669 https://access.redhat.com/errata/RHSA-2017:2669 Reply at: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1634496/comments/17 ** Changed in: linux Status: Unknown => Confirmed ** Changed in: linux Importance: Unknown => Medium ** Bug watch added: Red Hat Bugzilla #1373499 https://bugzilla.redhat.com/show_bug.cgi?id=1373499 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2016-7042 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1634496 Title: proc_keys_show crash when reading /proc/keys To manage notifications about this bug go to: https://bugs.launchpad.net/linux/+bug/1634496/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1634496] Re: proc_keys_show crash when reading /proc/keys
** Changed in: linux (Ubuntu) Status: In Progress => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1634496 Title: proc_keys_show crash when reading /proc/keys To manage notifications about this bug go to: https://bugs.launchpad.net/linux/+bug/1634496/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1634496] Re: proc_keys_show crash when reading /proc/keys
This bug was fixed in the package linux - 4.8.0-27.29 --- linux (4.8.0-27.29) yakkety; urgency=low [ Seth Forshee ] * Release Tracking Bug - LP: #1635377 * proc_keys_show crash when reading /proc/keys (LP: #1634496) - SAUCE: KEYS: ensure xbuf is large enough to fix buffer overflow in proc_keys_show (LP: #1634496) * Revert "If zone is so small that watermarks are the same, stop zone balance" in yakkety (LP: #1632894) - Revert "UBUNTU: SAUCE: (no-up) If zone is so small that watermarks are the same, stop zone balance." * lts-yakkety 4.8 cannot mount lvm raid1 (LP: #1631298) - SAUCE: (no-up) dm raid: fix compat_features validation * kswapd0 100% CPU usage (LP: #1518457) - SAUCE: (no-up) If zone is so small that watermarks are the same, stop zone balance. * [Trusty->Yakkety] powerpc/64: Fix incorrect return value from __copy_tofrom_user (LP: #1632462) - SAUCE: (no-up) powerpc/64: Fix incorrect return value from __copy_tofrom_user * Ubuntu 16.10: Oops panic in move_page_tables/page_remove_rmap after running memory_stress_ng. (LP: #1628976) - SAUCE: (no-up) powerpc/pseries: Fix stack corruption in htpe code * Paths not failed properly when unmapping virtual FC ports in VIOS (using ibmvfc) (LP: #1632116) - scsi: ibmvfc: Fix I/O hang when port is not mapped * [Ubuntu16.10]KV4.8: kernel livepatch config options are not set (LP: #1626983) - [Config] Enable live patching on powerpc/ppc64el * CONFIG_AUFS_XATTR is not set (LP: #1557776) - [Config] CONFIG_AUFS_XATTR=y * Yakkety update to 4.8.1 stable release (LP: #1632445) - arm64: debug: avoid resetting stepping state machine when TIF_SINGLESTEP - Using BUG_ON() as an assert() is _never_ acceptable - usb: misc: legousbtower: Fix NULL pointer deference - Staging: fbtft: Fix bug in fbtft-core - usb: usbip: vudc: fix left shift overflow - USB: serial: cp210x: Add ID for a Juniper console - Revert "usbtmc: convert to devm_kzalloc" - ALSA: hda - Adding one more ALC255 pin definition for headset problem - ALSA: hda - Fix headset mic detection problem for several Dell laptops - ALSA: hda - Add the top speaker pin config for HP Spectre x360 - Linux 4.8.1 * PSL data cache should be flushed before resetting CAPI adapter (LP: #1632049) - cxl: Flush PSL cache before resetting the adapter * thunder nic: avoid link delays due to RX_PACKET_DIS (LP: #1630038) - net: thunderx: Don't set RX_PACKET_DIS while initializing * crypto/vmx/p8_ghash memory corruption (LP: #1630970) - crypto: ghash-generic - move common definitions to a new header file - crypto: vmx - Fix memory corruption caused by p8_ghash - crypto: vmx - Ensure ghash-generic is enabled * arm64: SPCR console not autodetected (LP: #1630311) - of/serial: move earlycon early_param handling to serial - [Config] CONFIG_ACPI_SPCR_TABLE=y - ACPI: parse SPCR and enable matching console - ARM64: ACPI: enable ACPI_SPCR_TABLE - serial: pl011: add console matching function * include/linux/security.h header syntax error with !CONFIG_SECURITYFS (LP: #1630990) - SAUCE: (no-up) include/linux/security.h -- fix syntax error with CONFIG_SECURITYFS=n * sha1-powerpc returning wrong results (LP: #1629977) - crypto: sha1-powerpc - little-endian support -- Seth Forshee Thu, 20 Oct 2016 14:09:37 -0500 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1634496 Title: proc_keys_show crash when reading /proc/keys To manage notifications about this bug go to: https://bugs.launchpad.net/linux/+bug/1634496/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1634496] Re: proc_keys_show crash when reading /proc/keys
This bug was fixed in the package linux - 4.4.0-47.68 --- linux (4.4.0-47.68) xenial; urgency=low [ Kamal Mostafa ] * Release Tracking Bug - LP: #1636941 * Add a driver for Amazon Elastic Network Adapters (ENA) (LP: #1635721) - lib/bitmap.c: conversion routines to/from u32 array - net: ethtool: add new ETHTOOL_xLINKSETTINGS API - net: ena: Add a driver for Amazon Elastic Network Adapters (ENA) - [config] enable CONFIG_ENA_ETHERNET=m (Amazon ENA driver) * unexpectedly large memory usage of mounted snaps (LP: #1636847) - [Config] switch squashfs to single threaded decode -- Kamal Mostafa Wed, 26 Oct 2016 10:47:55 -0700 ** Changed in: linux (Ubuntu Xenial) Status: Fix Committed => Fix Released ** Changed in: linux (Ubuntu Yakkety) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1634496 Title: proc_keys_show crash when reading /proc/keys To manage notifications about this bug go to: https://bugs.launchpad.net/linux/+bug/1634496/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1634496] Re: proc_keys_show crash when reading /proc/keys
This bug was fixed in the package linux - 3.19.0-74.82 --- linux (3.19.0-74.82) vivid; urgency=low [ Seth Forshee ] * Release Tracking Bug - LP: #1635424 * proc_keys_show crash when reading /proc/keys (LP: #1634496) - SAUCE: KEYS: ensure xbuf is large enough to fix buffer overflow in proc_keys_show (LP: #1634496) * CVE-2015-7833 - usbvision: revert commit 588afcc1 * CVE-2015-7837 - SAUCE: (no-up) kexec/uefi: copy secure_boot flag in boot params across kexec reboot -- Seth Forshee Thu, 20 Oct 2016 16:26:38 -0500 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1634496 Title: proc_keys_show crash when reading /proc/keys To manage notifications about this bug go to: https://bugs.launchpad.net/linux/+bug/1634496/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1634496] Re: proc_keys_show crash when reading /proc/keys
This bug was fixed in the package linux - 3.19.0-74.82 --- linux (3.19.0-74.82) vivid; urgency=low [ Seth Forshee ] * Release Tracking Bug - LP: #1635424 * proc_keys_show crash when reading /proc/keys (LP: #1634496) - SAUCE: KEYS: ensure xbuf is large enough to fix buffer overflow in proc_keys_show (LP: #1634496) * CVE-2015-7833 - usbvision: revert commit 588afcc1 * CVE-2015-7837 - SAUCE: (no-up) kexec/uefi: copy secure_boot flag in boot params across kexec reboot -- Seth Forshee Thu, 20 Oct 2016 16:26:38 -0500 ** Changed in: linux (Ubuntu Vivid) Status: Fix Committed => Fix Released ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2015-7837 ** Changed in: linux (Ubuntu Vivid) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1634496 Title: proc_keys_show crash when reading /proc/keys To manage notifications about this bug go to: https://bugs.launchpad.net/linux/+bug/1634496/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1634496] Re: proc_keys_show crash when reading /proc/keys
This bug was fixed in the package linux - 3.13.0-101.148 --- linux (3.13.0-101.148) trusty; urgency=low [ Seth Forshee ] * Release Tracking Bug - LP: #1635430 * [arm64] nova instances can't boot with 3.13.0-92 (LP: #1608854) - Revert "efi: Disable interrupts around EFI calls, not in the epilog/prolog calls" - Revert "x86/efi: Use all 64 bit of efi_memmap in setup_e820()" - Revert "x86/efi: Store upper bits of command line buffer address in ext_cmd_line_ptr" - Revert "efivarfs: Ensure VariableName is NUL-terminated" - Revert "efi/libstub: Fix boundary checking in efi_high_alloc()" - Revert "arm64: efi: only attempt efi map setup if booting via EFI" - Revert "UBUNTU: arm64: Implement efi_enabled()" - Revert "efi/arm64: ignore dtb= when UEFI SecureBoot is enabled" - Revert "doc: arm64: add description of EFI stub support" - Revert "UBUNTU: Move get_dram_base to arm private file" - Revert "arm64: efi: add EFI stub" - Revert "arm64: add EFI runtime services" - Revert "efi: Add shared FDT related functions for ARM/ARM64" - Revert "efi: add helper function to get UEFI params from FDT" - Revert "doc: efi-stub.txt updates for ARM" - Revert "efi: Add get_dram_base() helper function" - Revert "efi: create memory map iteration helper" - Revert "x86, ia64: Move EFI_FB vga_default_device() initialization to pci_vga_fixup()" - Revert "firmware: Do not use WARN_ON(!spin_is_locked())" - Revert "efi-pstore: Fix an overflow on 32-bit builds" - Revert "x86/efi: Fix 32-bit fallout" - Revert "x86/efi: Check krealloc return value" - Revert "x86/efi: Runtime services virtual mapping" - Revert "x86/efi: Fix off-by-one bug in EFI Boot Services reservation" - x86/efi: Simplify EFI_DEBUG - x86/efi: Runtime services virtual mapping - x86/efi: Check krealloc return value - SAUCE: Merge tag 'efi-next' of git://git.kernel.org/pub/scm/linux/kernel/git/mfleming/efi into x86/efi - doc: Fix trivial spelling mistake in efi-stub.txt - x86/efi: Remove unused variables in __map_region() - x86/efi: Add a wrapper function efi_map_region_fixed() - x86/efi: Fix off-by-one bug in EFI Boot Services reservation - x86/efi: Cleanup efi_enter_virtual_mode() function - efi: Export more EFI table variables to sysfs - [Config] CONFIG_EFI_RUNTIME_MAP=y - efi: Export EFI runtime memory mapping to sysfs - x86/efi: Pass necessary EFI data for kexec via setup_data - x86/efi: Delete superfluous global variables - x86/efi: parse_efi_setup() build fix - SAUCE: Merge tag 'v3.13-rc7' into x86/efi-kexec to resolve conflicts - x86/efi: Allow mapping BGRT on x86-32 - x86/efi: Fix 32-bit fallout - x86/efi: Check status field to validate BGRT header - x86/efi: Quirk out SGI UV - v3.14 - Bacported EFI up to v3.14 - efi: Move facility flags to struct efi - efi: Set feature flags inside feature init functions - efivarfs: 'efivarfs_file_write' function reorganization - x86/efi: Delete out-of-date comments of efi_query_variable_store - x86/efi: Style neatening - x86/efi: Dump the EFI page table - x86, pageattr: Export page unmapping interface - x86/efi: Make efi virtual runtime map passing more robust - x86/efi: Split efi_enter_virtual_mode - ia64/efi: Implement efi_enabled() - efi: Use NULL instead of 0 for pointer - x86, tools: Consolidate #ifdef code - x86/efi: Delete dead code when checking for non-native - efi: Add separate 32-bit/64-bit definitions - x86/efi: Build our own EFI services pointer table - x86/efi: Add early thunk code to go from 64-bit to 32-bit - x86/efi: Firmware agnostic handover entry points - [Config] CONFIG_EFI_MIXED=y - x86/efi: Wire up CONFIG_EFI_MIXED - x86/efi: Re-disable interrupts after calling firmware services - SAUCE: Merge remote-tracking branch 'tip/x86/efi-mixed' into efi-for-mingo - x86, tools: Fix up compiler warnings - x86/efi: Preserve segment registers in mixed mode - x86/efi: Rip out phys_efi_get_time() - x86/efi: Restore 'attr' argument to query_variable_info() - SAUCE: merge with v3.15 - fs/efivarfs/super.c: use static const for dentry_operations - SAUCE: merge with v3.16 - efi: efi-stub-helper cleanup - efi: create memory map iteration helper - efi: Add shared printk wrapper for consistent prefixing - efi: Add get_dram_base() helper function - efi: x86: Handle arbitrary Unicode characters - x86/efi: Delete most of the efi_call* macros - x86/efi: Implement a __efi_call_virt macro - x86/efi: Save and restore FPU context around efi_calls (x86_64) - x86/efi: Save and restore FPU context around efi_calls (i386) - efivars: Use local variables instead of a pointer dereference - efivars: Check size of user object - efivars: Stop passing a struct argument to
[Bug 1634496] Re: proc_keys_show crash when reading /proc/keys
This bug was fixed in the package linux - 3.2.0-115.157 --- linux (3.2.0-115.157) precise; urgency=low [ Seth Forshee ] * Release Tracking Bug - LP: #1636537 * CVE-2016-5195 - Revert "UBUNTU:SAUCE: mm: remove gup_flags FOLL_WRITE games from __get_user_pages()" - mm, gup: close FOLL MAP_PRIVATE race linux (3.2.0-114.156) precise; urgency=low [ Seth Forshee ] * Release Tracking Bug - LP: #1635436 * proc_keys_show crash when reading /proc/keys (LP: #1634496) - SAUCE: KEYS: ensure xbuf is large enough to fix buffer overflow in proc_keys_show (LP: #1634496) * CVE-2016-7117 - net: Fix use after free in the recvmmsg exit path * CVE-2015-7833 - usbvision: revert commit 588afcc1 -- Seth Forshee Tue, 25 Oct 2016 09:58:32 -0500 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1634496 Title: proc_keys_show crash when reading /proc/keys To manage notifications about this bug go to: https://bugs.launchpad.net/linux/+bug/1634496/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1634496] Re: proc_keys_show crash when reading /proc/keys
This bug was fixed in the package linux - 3.2.0-115.157 --- linux (3.2.0-115.157) precise; urgency=low [ Seth Forshee ] * Release Tracking Bug - LP: #1636537 * CVE-2016-5195 - Revert "UBUNTU:SAUCE: mm: remove gup_flags FOLL_WRITE games from __get_user_pages()" - mm, gup: close FOLL MAP_PRIVATE race linux (3.2.0-114.156) precise; urgency=low [ Seth Forshee ] * Release Tracking Bug - LP: #1635436 * proc_keys_show crash when reading /proc/keys (LP: #1634496) - SAUCE: KEYS: ensure xbuf is large enough to fix buffer overflow in proc_keys_show (LP: #1634496) * CVE-2016-7117 - net: Fix use after free in the recvmmsg exit path * CVE-2015-7833 - usbvision: revert commit 588afcc1 -- Seth Forshee Tue, 25 Oct 2016 09:58:32 -0500 ** Changed in: linux (Ubuntu Precise) Status: Fix Committed => Fix Released ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2015-7833 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2016-5195 ** CVE added: http://www.cve.mitre.org/cgi- bin/cvename.cgi?name=2016-7117 ** Changed in: linux (Ubuntu Precise) Status: Fix Committed => Fix Released -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1634496 Title: proc_keys_show crash when reading /proc/keys To manage notifications about this bug go to: https://bugs.launchpad.net/linux/+bug/1634496/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1634496] Re: proc_keys_show crash when reading /proc/keys
Verified that this is fixed in all -proposed kernels. In precise /proc/keys is not present as a result of CONFIG_KEYS_DEBUG_PROC_KEYS=n, however it's a trivial fix and there's no harm in carrying the patch. ** Tags added: verification-done-precise verification-done-trusty verification-done-vivid verification-done-xenial verification-done- yakkety -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1634496 Title: proc_keys_show crash when reading /proc/keys To manage notifications about this bug go to: https://bugs.launchpad.net/linux/+bug/1634496/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1634496] Re: proc_keys_show crash when reading /proc/keys
** Changed in: linux (Ubuntu Precise) Status: In Progress => Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1634496 Title: proc_keys_show crash when reading /proc/keys To manage notifications about this bug go to: https://bugs.launchpad.net/linux/+bug/1634496/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1634496] Re: proc_keys_show crash when reading /proc/keys
** Changed in: linux (Ubuntu Vivid) Status: In Progress => Fix Committed ** Changed in: linux (Ubuntu Trusty) Status: In Progress => Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1634496 Title: proc_keys_show crash when reading /proc/keys To manage notifications about this bug go to: https://bugs.launchpad.net/linux/+bug/1634496/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1634496] Re: proc_keys_show crash when reading /proc/keys
** Changed in: linux (Ubuntu Yakkety) Status: In Progress => Fix Committed ** Changed in: linux (Ubuntu Xenial) Status: In Progress => Fix Committed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1634496 Title: proc_keys_show crash when reading /proc/keys To manage notifications about this bug go to: https://bugs.launchpad.net/linux/+bug/1634496/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1634496] Re: proc_keys_show crash when reading /proc/keys
** Also affects: linux (Ubuntu Yakkety) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Trusty) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Vivid) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Precise) Importance: Undecided Status: New ** Also affects: linux (Ubuntu Xenial) Importance: Undecided Status: New ** Changed in: linux (Ubuntu Precise) Importance: Undecided => High ** Changed in: linux (Ubuntu Precise) Status: New => In Progress ** Changed in: linux (Ubuntu Trusty) Importance: Undecided => High ** Changed in: linux (Ubuntu Trusty) Status: New => In Progress ** Changed in: linux (Ubuntu Vivid) Importance: Undecided => High ** Changed in: linux (Ubuntu Vivid) Status: New => In Progress ** Changed in: linux (Ubuntu Vivid) Assignee: (unassigned) => Colin Ian King (colin-king) ** Changed in: linux (Ubuntu Precise) Assignee: (unassigned) => Colin Ian King (colin-king) ** Changed in: linux (Ubuntu Trusty) Assignee: (unassigned) => Colin Ian King (colin-king) ** Changed in: linux (Ubuntu Xenial) Importance: Undecided => High ** Changed in: linux (Ubuntu Xenial) Status: New => In Progress ** Changed in: linux (Ubuntu Xenial) Assignee: (unassigned) => Colin Ian King (colin-king) ** Changed in: linux (Ubuntu Yakkety) Importance: Undecided => High ** Changed in: linux (Ubuntu Yakkety) Status: New => In Progress ** Changed in: linux (Ubuntu Yakkety) Assignee: (unassigned) => Colin Ian King (colin-king) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1634496 Title: proc_keys_show crash when reading /proc/keys To manage notifications about this bug go to: https://bugs.launchpad.net/linux/+bug/1634496/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1634496] Re: proc_keys_show crash when reading /proc/keys
** Information type changed from Private Security to Public Security ** Changed in: linux (Ubuntu) Assignee: (unassigned) => Colin Ian King (colin-king) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1634496 Title: proc_keys_show crash when reading /proc/keys To manage notifications about this bug go to: https://bugs.launchpad.net/linux/+bug/1634496/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs