APPLIED: [CVE artful/linux trusty/linux CVE-2018-5803] SCTP DOS

Khaled Elmously khalid.elmously at canonical.com
Wed Jun 6 23:24:07 UTC 2018


Applied to trusty and artful


On 2018-06-04 13:24:38 , Andy Whitcroft wrote:
> CVE-2018-5803:
> 	It was discovered that the SCTP Protocol implementation in
> 	the Linux kernel did not properly validate userspace provided
> 	payload lengths in some situations. A local attacker could
> 	use this to cause a denial of service (system crash).
> 
> Following this email are patches for artful/linux (a cherry-pick) and
> trusty/linux (a backport).  Other series have received this fix via
> upstream and stables.
> 
> Proposing for SRU to artful/linux and trusty/linux.
> 
> -apw
> 
> -- 
> kernel-team mailing list
> kernel-team at lists.ubuntu.com
> https://lists.ubuntu.com/mailman/listinfo/kernel-team




More information about the kernel-team mailing list