ACK: [CVE artful/linux trusty/linux CVE-2018-5803] SCTP DOS

Stefan Bader stefan.bader at canonical.com
Tue Jun 5 15:47:16 UTC 2018


On 04.06.2018 05:24, Andy Whitcroft wrote:
> CVE-2018-5803:
> 	It was discovered that the SCTP Protocol implementation in
> 	the Linux kernel did not properly validate userspace provided
> 	payload lengths in some situations. A local attacker could
> 	use this to cause a denial of service (system crash).
> 
> Following this email are patches for artful/linux (a cherry-pick) and
> trusty/linux (a backport).  Other series have received this fix via
> upstream and stables.
> 
> Proposing for SRU to artful/linux and trusty/linux.
> 
> -apw
> 
Acked-by: Stefan Bader <stefan.bader at canonical.com>


-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/kernel-team/attachments/20180605/289a1774/attachment.sig>


More information about the kernel-team mailing list