This bug was fixed in the package linux-aws-edge -
4.18.0-1020.24~18.04.1
---------------
linux-aws-edge (4.18.0-1020.24~18.04.1) bionic; urgency=medium
* linux-aws-edge: 4.18.0-1020.24~18.04.1 -proposed tracker (LP:
#1833939)
[ Ubuntu: 4.18.0-1020.24 ]
* linux-aws: 4.18.0-1020.24 -proposed tracker (LP: #1833940)
* linux: 4.18.0-25.26 -proposed tracker (LP: #1833952)
* CVE-2019-11479
- SAUCE: tcp: add tcp_min_snd_mss sysctl
- SAUCE: tcp: enforce tcp_min_snd_mss in tcp_mtu_probing()
* Remote denial of service (resource exhaustion) caused by TCP SACK scoreboard
manipulation (LP: #1831638) // CVE-2019-11478
- tcp: refine memory limit test in tcp_fragment()
* CVE-2019-12817
- SAUCE: powerpc/mm/64s/hash: Reallocate context ids on fork
-- Stefan Bader <[email protected]> Thu, 27 Jun 2019 11:09:01
+0200
** Changed in: linux-aws-edge (Ubuntu Bionic)
Status: New => Fix Released
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2019-11478
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2019-11479
** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2019-12817
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1833939
Title:
linux-aws-edge: 4.18.0-1020.24~18.04.1 -proposed tracker
To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1833939/+subscriptions
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs