ACK: [CVE artful/linux trusty/linux CVE-2018-5803] SCTP DOS
Stefan Bader
stefan.bader at canonical.com
Tue Jun 5 15:47:16 UTC 2018
On 04.06.2018 05:24, Andy Whitcroft wrote:
> CVE-2018-5803:
> It was discovered that the SCTP Protocol implementation in
> the Linux kernel did not properly validate userspace provided
> payload lengths in some situations. A local attacker could
> use this to cause a denial of service (system crash).
>
> Following this email are patches for artful/linux (a cherry-pick) and
> trusty/linux (a backport). Other series have received this fix via
> upstream and stables.
>
> Proposing for SRU to artful/linux and trusty/linux.
>
> -apw
>
Acked-by: Stefan Bader <stefan.bader at canonical.com>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 819 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/kernel-team/attachments/20180605/289a1774/attachment.sig>
More information about the kernel-team
mailing list