APPLIED: [CVE artful/linux trusty/linux CVE-2018-5803] SCTP DOS
Khaled Elmously
khalid.elmously at canonical.com
Wed Jun 6 23:24:07 UTC 2018
Applied to trusty and artful
On 2018-06-04 13:24:38 , Andy Whitcroft wrote:
> CVE-2018-5803:
> It was discovered that the SCTP Protocol implementation in
> the Linux kernel did not properly validate userspace provided
> payload lengths in some situations. A local attacker could
> use this to cause a denial of service (system crash).
>
> Following this email are patches for artful/linux (a cherry-pick) and
> trusty/linux (a backport). Other series have received this fix via
> upstream and stables.
>
> Proposing for SRU to artful/linux and trusty/linux.
>
> -apw
>
> --
> kernel-team mailing list
> kernel-team at lists.ubuntu.com
> https://lists.ubuntu.com/mailman/listinfo/kernel-team
More information about the kernel-team
mailing list