This bug was fixed in the package linux-euclid - 4.4.0-9029.31
--------------- linux-euclid (4.4.0-9029.31) xenial; urgency=medium
* linux-euclid: 4.4.0-9029.31 -proposed tracker (LP: #1799407)
* CVE-2018-5390 - tcp: avoid collapses in tcp_prune_queue() if possible - tcp: detect malicious patterns in tcp_collapse_ofo_queue()
* CVE-2018-5391 - Revert "net: increase fragment memory usage limits"
* CVE-2018-14634 - fs/exec.c: account for argv/envp pointers - exec: Limit arg stack to at most 75% of _STK_LIM
* CVE-2017-6074 - dccp: fix freeing skb too early for IPV6_RECVPKTINFO
* CVE-2017-18344 - posix-timer: Properly check sigevent->sigev_notify
-- Stefan Bader <email address hidden> Fri, 10 Aug 2018 15:50:05 +0200
This bug was fixed in the package linux-euclid - 4.4.0-9029.31
---------------
linux-euclid (4.4.0-9029.31) xenial; urgency=medium
* linux-euclid: 4.4.0-9029.31 -proposed tracker (LP: #1799407)
* CVE-2018-5390 ofo_queue( )
- tcp: avoid collapses in tcp_prune_queue() if possible
- tcp: detect malicious patterns in tcp_collapse_
* CVE-2018-5391
- Revert "net: increase fragment memory usage limits"
* CVE-2018-14634
- fs/exec.c: account for argv/envp pointers
- exec: Limit arg stack to at most 75% of _STK_LIM
* CVE-2017-6074
- dccp: fix freeing skb too early for IPV6_RECVPKTINFO
* CVE-2017-18344 >sigev_ notify
- posix-timer: Properly check sigevent-
-- Stefan Bader <email address hidden> Fri, 10 Aug 2018 15:50:05 +0200