This bug was fixed in the package linux-euclid - 4.4.0-9029.31
---------------
linux-euclid (4.4.0-9029.31) xenial; urgency=medium
* linux-euclid: 4.4.0-9029.31 -proposed tracker (LP: #1799407)
* CVE-2018-5390
- tcp: avoid collapses in tcp_prune_queue() if possible
- tcp: detect malicious patterns in tcp_collapse_ofo_queue()
* CVE-2018-5391
- Revert "net: increase fragment memory usage limits"
* CVE-2018-14634
- fs/exec.c: account for argv/envp pointers
- exec: Limit arg stack to at most 75% of _STK_LIM
* CVE-2017-6074
- dccp: fix freeing skb too early for IPV6_RECVPKTINFO
* CVE-2017-18344
- posix-timer: Properly check sigevent->sigev_notify
-- Stefan Bader <[email protected]> Fri, 10 Aug 2018 15:50:05
+0200
** Changed in: linux-euclid (Ubuntu Xenial)
Status: Confirmed => Fix Released
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-18344
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-6074
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-14634
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-5390
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-5391
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1799407
Title:
linux-euclid: 4.4.0-9029.31 -proposed tracker
To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1799407/+subscriptions
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs