This bug was fixed in the package linux-euclid - 4.4.0-9029.31 --------------- linux-euclid (4.4.0-9029.31) xenial; urgency=medium
* linux-euclid: 4.4.0-9029.31 -proposed tracker (LP: #1799407) * CVE-2018-5390 - tcp: avoid collapses in tcp_prune_queue() if possible - tcp: detect malicious patterns in tcp_collapse_ofo_queue() * CVE-2018-5391 - Revert "net: increase fragment memory usage limits" * CVE-2018-14634 - fs/exec.c: account for argv/envp pointers - exec: Limit arg stack to at most 75% of _STK_LIM * CVE-2017-6074 - dccp: fix freeing skb too early for IPV6_RECVPKTINFO * CVE-2017-18344 - posix-timer: Properly check sigevent->sigev_notify -- Stefan Bader <stefan.ba...@canonical.com> Fri, 10 Aug 2018 15:50:05 +0200 ** Changed in: linux-euclid (Ubuntu Xenial) Status: Confirmed => Fix Released ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-18344 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-6074 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-14634 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-5390 ** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-5391 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1799407 Title: linux-euclid: 4.4.0-9029.31 -proposed tracker To manage notifications about this bug go to: https://bugs.launchpad.net/kernel-sru-workflow/+bug/1799407/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs