Since preparation the following patches also got applied already:
* net: ipv4: fix for a race condition in raw_sendmsg (CVE-2017-17712)
* net: Fix double free and memory corruption in get_net_ns_by_id()
  (CVE-2017-15129)

** Also affects: linux (Ubuntu Xenial)
   Importance: Undecided
       Status: New

** Changed in: linux (Ubuntu)
       Status: New => Invalid

** Changed in: linux (Ubuntu Xenial)
   Importance: Undecided => Medium

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-15129

** CVE added: https://cve.mitre.org/cgi-bin/cvename.cgi?name=2017-17712

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1745069

Title:
  Xenial update to 4.4.109 stable release

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1745069/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to