CVE-2015-5283
Published: 19 October 2015
The sctp_init function in net/sctp/protocol.c in the Linux kernel before 4.2.3 has an incorrect sequence of protocol-initialization steps, which allows local users to cause a denial of service (panic or memory corruption) by creating SCTP sockets before all of the steps have finished.
From the Ubuntu security team
It was discovered that the SCTP protocol implementation in the Linux kernel performed an incorrect sequence of protocol-initialization steps. A local attacker could use this to cause a denial of service (system crash).
Priority
Status
Package | Release | Status |
---|---|---|
linux Launchpad, Ubuntu, Debian |
upstream |
Released
(4.3~rc3)
|
linux-2.6 Launchpad, Ubuntu, Debian |
upstream |
Released
(4.3~rc3)
|
linux-armadaxp Launchpad, Ubuntu, Debian |
upstream |
Released
(4.3~rc3)
|
linux-aws Launchpad, Ubuntu, Debian |
upstream |
Released
(4.3~rc3)
|
linux-ec2 Launchpad, Ubuntu, Debian |
upstream |
Released
(4.3~rc3)
|
linux-flo Launchpad, Ubuntu, Debian |
upstream |
Released
(4.3~rc3)
|
linux-fsl-imx51 Launchpad, Ubuntu, Debian |
upstream |
Released
(4.3~rc3)
|
linux-gke Launchpad, Ubuntu, Debian |
upstream |
Released
(4.3~rc3)
|
linux-goldfish Launchpad, Ubuntu, Debian |
upstream |
Released
(4.3~rc3)
|
linux-grouper Launchpad, Ubuntu, Debian |
upstream |
Released
(4.3~rc3)
|
linux-hwe Launchpad, Ubuntu, Debian |
upstream |
Released
(4.3~rc3)
|
linux-hwe-edge Launchpad, Ubuntu, Debian |
upstream |
Released
(4.3~rc3)
|
linux-linaro-omap Launchpad, Ubuntu, Debian |
upstream |
Released
(4.3~rc3)
|
linux-linaro-shared Launchpad, Ubuntu, Debian |
upstream |
Released
(4.3~rc3)
|
linux-linaro-vexpress Launchpad, Ubuntu, Debian |
upstream |
Released
(4.3~rc3)
|
linux-lts-quantal Launchpad, Ubuntu, Debian |
upstream |
Released
(4.3~rc3)
|
linux-lts-raring Launchpad, Ubuntu, Debian |
upstream |
Released
(4.3~rc3)
|
linux-lts-saucy Launchpad, Ubuntu, Debian |
upstream |
Released
(4.3~rc3)
|
linux-lts-trusty Launchpad, Ubuntu, Debian |
upstream |
Released
(4.3~rc3)
|
linux-lts-utopic Launchpad, Ubuntu, Debian |
upstream |
Released
(4.3~rc3)
|
linux-lts-vivid Launchpad, Ubuntu, Debian |
upstream |
Released
(4.3~rc3)
|
linux-lts-wily Launchpad, Ubuntu, Debian |
upstream |
Released
(4.3~rc3)
|
linux-lts-xenial Launchpad, Ubuntu, Debian |
upstream |
Released
(4.3~rc3)
|
linux-maguro Launchpad, Ubuntu, Debian |
upstream |
Released
(4.3~rc3)
|
linux-mako Launchpad, Ubuntu, Debian |
upstream |
Released
(4.3~rc3)
|
linux-manta Launchpad, Ubuntu, Debian |
upstream |
Released
(4.3~rc3)
|
linux-mvl-dove Launchpad, Ubuntu, Debian |
upstream |
Released
(4.3~rc3)
|
linux-qcm-msm Launchpad, Ubuntu, Debian |
upstream |
Released
(4.3~rc3)
|
linux-raspi2 Launchpad, Ubuntu, Debian |
upstream |
Released
(4.3~rc3)
|
linux-snapdragon Launchpad, Ubuntu, Debian |
upstream |
Released
(4.3~rc3)
|
linux-ti-omap4 Launchpad, Ubuntu, Debian |
upstream |
Released
(4.3~rc3)
|
Notes
Author | Note |
---|---|
jdstrand | android kernels (flo, goldfish, grouper, maguro, mako and manta) are not supported on the Ubuntu Touch 14.10 and earlier preview kernels linux-lts-saucy no longer receives official support linux-lts-quantal no longer receives official support |
References
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-5283
- http://patchwork.ozlabs.org/patch/515996/
- https://ubuntu.com/security/notices/USN-2797-1
- https://ubuntu.com/security/notices/USN-2823-1
- https://ubuntu.com/security/notices/USN-2826-1
- https://ubuntu.com/security/notices/USN-2829-1
- https://ubuntu.com/security/notices/USN-2829-2
- NVD
- Launchpad
- Debian