This bug was fixed in the package linux - 3.19.0-91.99
---------------
linux (3.19.0-91.99) vivid; urgency=low
* CVE-2017-1000112
- ipv4: Should use consistent conditional judgement for ip fragment in
__ip_append_data and ip_finish_output
- ipv6: Don't use ufo handling on later transformed packets
- udp: avoid ufo handling on IP payload compression packets
- ipv6: Should use consistent conditional judgement for ip6 fragment between
__ip6_append_data and ip6_finish_output
- net: account for current skb length when deciding about UFO
- udp: consistently apply ufo or fragmentation
* CVE-2017-1000111
- net-packet: fix race in packet_set_ring on PACKET_RESERVE
-- Stefan Bader <email address hidden> Mon, 07 Aug 2017 14:24:17 +0200
This bug was fixed in the package linux - 3.19.0-91.99
---------------
linux (3.19.0-91.99) vivid; urgency=low
* CVE-2017-1000112 _ip_append_ data and ip_finish_output _ip6_append_ data and ip6_finish_output
- ipv4: Should use consistent conditional judgement for ip fragment in
_
- ipv6: Don't use ufo handling on later transformed packets
- udp: avoid ufo handling on IP payload compression packets
- ipv6: Should use consistent conditional judgement for ip6 fragment between
_
- net: account for current skb length when deciding about UFO
- udp: consistently apply ufo or fragmentation
* CVE-2017-1000111
- net-packet: fix race in packet_set_ring on PACKET_RESERVE
-- Stefan Bader <email address hidden> Mon, 07 Aug 2017 14:24:17 +0200