This bug was fixed in the package linux-euclid - 4.4.0-9029.31

---------------
linux-euclid (4.4.0-9029.31) xenial; urgency=medium

  * linux-euclid: 4.4.0-9029.31 -proposed tracker (LP: #1799407)

  * CVE-2018-5390
    - tcp: avoid collapses in tcp_prune_queue() if possible
    - tcp: detect malicious patterns in tcp_collapse_ofo_queue()

  * CVE-2018-5391
    - Revert "net: increase fragment memory usage limits"

  * CVE-2018-14634
    - fs/exec.c: account for argv/envp pointers
    - exec: Limit arg stack to at most 75% of _STK_LIM

  * CVE-2017-6074
    - dccp: fix freeing skb too early for IPV6_RECVPKTINFO

  * CVE-2017-18344
    - posix-timer: Properly check sigevent->sigev_notify

 -- Stefan Bader <stefan.ba...@canonical.com>  Fri, 10 Aug 2018 15:50:05
+0200

** Changed in: linux-euclid (Ubuntu Xenial)
       Status: Confirmed => Fix Released

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-18344

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-6074

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-14634

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-5390

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-5391

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1799407

Title:
  linux-euclid: 4.4.0-9029.31 -proposed tracker

To manage notifications about this bug go to:
https://bugs.launchpad.net/kernel-sru-workflow/+bug/1799407/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to