ALT-PU-2015-1834-1
Package kernel-image-un-def updated to version 4.2.3-alt1 for branch sisyphus in task 150562.
Closed vulnerabilities
Modified: 2024-05-16
BDU:2018-00574
Уязвимость функции stub_send_ret_submit ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-05-16
BDU:2018-00575
Уязвимость функции stub_recv_cmd_submit ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-05-16
BDU:2018-00576
Уязвимость функции get_pipe ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-04-12
CVE-2015-5156
The virtnet_probe function in drivers/net/virtio_net.c in the Linux kernel before 4.2 attempts to support a FRAGLIST feature without proper memory allocation, which allows guest OS users to cause a denial of service (buffer overflow and memory corruption) via a crafted sequence of fragmented packets.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=48900cb6af4282fa0fb6ff4d72a81aa3dadb5c39
 - http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171454.html
 - http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169378.html
 - http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00009.html
 - http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00018.html
 - http://rhn.redhat.com/errata/RHSA-2015-1978.html
 - http://rhn.redhat.com/errata/RHSA-2016-0855.html
 - http://www.debian.org/security/2015/dsa-3364
 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
 - http://www.securityfocus.com/bid/76230
 - http://www.securitytracker.com/id/1034045
 - http://www.ubuntu.com/usn/USN-2773-1
 - http://www.ubuntu.com/usn/USN-2774-1
 - http://www.ubuntu.com/usn/USN-2777-1
 - https://bugzilla.redhat.com/show_bug.cgi?id=1243852
 - https://github.com/torvalds/linux/commit/48900cb6af4282fa0fb6ff4d72a81aa3dadb5c39
 - http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=48900cb6af4282fa0fb6ff4d72a81aa3dadb5c39
 - http://lists.fedoraproject.org/pipermail/package-announce/2015-November/171454.html
 - http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169378.html
 - http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00009.html
 - http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00018.html
 - http://rhn.redhat.com/errata/RHSA-2015-1978.html
 - http://rhn.redhat.com/errata/RHSA-2016-0855.html
 - http://www.debian.org/security/2015/dsa-3364
 - http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
 - http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
 - http://www.securityfocus.com/bid/76230
 - http://www.securitytracker.com/id/1034045
 - http://www.ubuntu.com/usn/USN-2773-1
 - http://www.ubuntu.com/usn/USN-2774-1
 - http://www.ubuntu.com/usn/USN-2777-1
 - https://bugzilla.redhat.com/show_bug.cgi?id=1243852
 - https://github.com/torvalds/linux/commit/48900cb6af4282fa0fb6ff4d72a81aa3dadb5c39
 
Modified: 2025-04-12
CVE-2015-5283
The sctp_init function in net/sctp/protocol.c in the Linux kernel before 4.2.3 has an incorrect sequence of protocol-initialization steps, which allows local users to cause a denial of service (panic or memory corruption) by creating SCTP sockets before all of the steps have finished.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8e2d61e0aed2b7c4ecb35844fe07e0b2b762dee4
 - http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00009.html
 - http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00005.html
 - http://patchwork.ozlabs.org/patch/515996/
 - http://www.debian.org/security/2015/dsa-3372
 - http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.2.3
 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
 - http://www.securityfocus.com/bid/77058
 - http://www.securitytracker.com/id/1033808
 - http://www.ubuntu.com/usn/USN-2823-1
 - http://www.ubuntu.com/usn/USN-2826-1
 - http://www.ubuntu.com/usn/USN-2829-1
 - http://www.ubuntu.com/usn/USN-2829-2
 - https://bugzilla.redhat.com/show_bug.cgi?id=1257528
 - https://github.com/torvalds/linux/commit/8e2d61e0aed2b7c4ecb35844fe07e0b2b762dee4
 - https://security-tracker.debian.org/tracker/CVE-2015-5283
 - http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8e2d61e0aed2b7c4ecb35844fe07e0b2b762dee4
 - http://lists.opensuse.org/opensuse-security-announce/2015-10/msg00009.html
 - http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00005.html
 - http://patchwork.ozlabs.org/patch/515996/
 - http://www.debian.org/security/2015/dsa-3372
 - http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.2.3
 - http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
 - http://www.securityfocus.com/bid/77058
 - http://www.securitytracker.com/id/1033808
 - http://www.ubuntu.com/usn/USN-2823-1
 - http://www.ubuntu.com/usn/USN-2826-1
 - http://www.ubuntu.com/usn/USN-2829-1
 - http://www.ubuntu.com/usn/USN-2829-2
 - https://bugzilla.redhat.com/show_bug.cgi?id=1257528
 - https://github.com/torvalds/linux/commit/8e2d61e0aed2b7c4ecb35844fe07e0b2b762dee4
 - https://security-tracker.debian.org/tracker/CVE-2015-5283
 
Modified: 2025-04-12
CVE-2015-7799
The slhc_init function in drivers/net/slip/slhc.c in the Linux kernel through 4.2.3 does not ensure that certain slot numbers are valid, which allows local users to cause a denial of service (NULL pointer dereference and system crash) via a crafted PPPIOCSMAXCID ioctl call.
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00005.html
 - http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00018.html
 - http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00026.html
 - http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00031.html
 - http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00015.html
 - http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html
 - http://lists.opensuse.org/opensuse-updates/2015-12/msg00039.html
 - http://www.debian.org/security/2015/dsa-3426
 - http://www.openwall.com/lists/oss-security/2015/10/10/3
 - http://www.securityfocus.com/bid/77033
 - http://www.securitytracker.com/id/1033809
 - http://www.ubuntu.com/usn/USN-2841-1
 - http://www.ubuntu.com/usn/USN-2841-2
 - http://www.ubuntu.com/usn/USN-2842-1
 - http://www.ubuntu.com/usn/USN-2842-2
 - http://www.ubuntu.com/usn/USN-2843-1
 - http://www.ubuntu.com/usn/USN-2843-2
 - http://www.ubuntu.com/usn/USN-2843-3
 - http://www.ubuntu.com/usn/USN-2844-1
 - http://www.ubuntu.com/usn/USN-2886-1
 - https://bugzilla.redhat.com/show_bug.cgi?id=1271134
 - https://code.google.com/p/android/issues/detail?id=187973
 - http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00005.html
 - http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00018.html
 - http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00026.html
 - http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00031.html
 - http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00015.html
 - http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html
 - http://lists.opensuse.org/opensuse-updates/2015-12/msg00039.html
 - http://www.debian.org/security/2015/dsa-3426
 - http://www.openwall.com/lists/oss-security/2015/10/10/3
 - http://www.securityfocus.com/bid/77033
 - http://www.securitytracker.com/id/1033809
 - http://www.ubuntu.com/usn/USN-2841-1
 - http://www.ubuntu.com/usn/USN-2841-2
 - http://www.ubuntu.com/usn/USN-2842-1
 - http://www.ubuntu.com/usn/USN-2842-2
 - http://www.ubuntu.com/usn/USN-2843-1
 - http://www.ubuntu.com/usn/USN-2843-2
 - http://www.ubuntu.com/usn/USN-2843-3
 - http://www.ubuntu.com/usn/USN-2844-1
 - http://www.ubuntu.com/usn/USN-2886-1
 - https://bugzilla.redhat.com/show_bug.cgi?id=1271134
 - https://code.google.com/p/android/issues/detail?id=187973
 
Modified: 2025-04-12
CVE-2015-8746
fs/nfs/nfs4proc.c in the NFS client in the Linux kernel before 4.2.2 does not properly initialize memory for migration recovery operations, which allows remote NFS servers to cause a denial of service (NULL pointer dereference and panic) via crafted network traffic.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=18e3b739fdc826481c6a1335ce0c5b19b3d415da
 - http://rhn.redhat.com/errata/RHSA-2016-2574.html
 - http://rhn.redhat.com/errata/RHSA-2016-2584.html
 - http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.2.2
 - http://www.openwall.com/lists/oss-security/2016/01/05/9
 - http://www.securitytracker.com/id/1034594
 - https://bugzilla.redhat.com/show_bug.cgi?id=1295802
 - https://github.com/torvalds/linux/commit/18e3b739fdc826481c6a1335ce0c5b19b3d415da
 - http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=18e3b739fdc826481c6a1335ce0c5b19b3d415da
 - http://rhn.redhat.com/errata/RHSA-2016-2574.html
 - http://rhn.redhat.com/errata/RHSA-2016-2584.html
 - http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.2.2
 - http://www.openwall.com/lists/oss-security/2016/01/05/9
 - http://www.securitytracker.com/id/1034594
 - https://bugzilla.redhat.com/show_bug.cgi?id=1295802
 - https://github.com/torvalds/linux/commit/18e3b739fdc826481c6a1335ce0c5b19b3d415da
 
Modified: 2025-04-12
CVE-2015-8956
The rfcomm_sock_bind function in net/bluetooth/rfcomm/sock.c in the Linux kernel before 4.2 allows local users to obtain sensitive information or cause a denial of service (NULL pointer dereference) via vectors involving a bind system call on a Bluetooth RFCOMM socket.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=951b6a0717db97ce420547222647bcc40bf1eacd
 - http://rhn.redhat.com/errata/RHSA-2016-2574.html
 - http://rhn.redhat.com/errata/RHSA-2016-2584.html
 - http://source.android.com/security/bulletin/2016-10-01.html
 - http://www.securityfocus.com/bid/93326
 - https://github.com/torvalds/linux/commit/951b6a0717db97ce420547222647bcc40bf1eacd
 - http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=951b6a0717db97ce420547222647bcc40bf1eacd
 - http://rhn.redhat.com/errata/RHSA-2016-2574.html
 - http://rhn.redhat.com/errata/RHSA-2016-2584.html
 - http://source.android.com/security/bulletin/2016-10-01.html
 - http://www.securityfocus.com/bid/93326
 - https://github.com/torvalds/linux/commit/951b6a0717db97ce420547222647bcc40bf1eacd
 
Modified: 2025-04-20
CVE-2017-15116
The rngapi_reset function in crypto/rng.c in the Linux kernel before 4.2 allows attackers to cause a denial of service (NULL pointer dereference).
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=94f1bb15bed84ad6c893916b7e7b9db6f1d7eec6
 - https://access.redhat.com/errata/RHSA-2018:0676
 - https://access.redhat.com/errata/RHSA-2018:1062
 - https://bugzilla.redhat.com/show_bug.cgi?id=1485815
 - https://bugzilla.redhat.com/show_bug.cgi?id=1514609
 - https://github.com/torvalds/linux/commit/94f1bb15bed84ad6c893916b7e7b9db6f1d7eec6
 - http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=94f1bb15bed84ad6c893916b7e7b9db6f1d7eec6
 - https://access.redhat.com/errata/RHSA-2018:0676
 - https://access.redhat.com/errata/RHSA-2018:1062
 - https://bugzilla.redhat.com/show_bug.cgi?id=1485815
 - https://bugzilla.redhat.com/show_bug.cgi?id=1514609
 - https://github.com/torvalds/linux/commit/94f1bb15bed84ad6c893916b7e7b9db6f1d7eec6
 
Modified: 2024-11-21
CVE-2017-16912
The "get_pipe()" function (drivers/usb/usbip/stub_rx.c) in the Linux Kernel before version 4.14.8, 4.9.71, and 4.4.114 allows attackers to cause a denial of service (out-of-bounds read) via a specially crafted USB over IP packet.
- http://www.securityfocus.com/bid/102150
 - https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.8
 - https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.114
 - https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.71
 - https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git/commit/drivers/usb/usbip?id=635f545a7e8be7596b9b2b6a43cab6bbd5a88e43
 - https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html
 - https://secuniaresearch.flexerasoftware.com/advisories/77000/
 - https://secuniaresearch.flexerasoftware.com/secunia_research/2017-21/
 - https://usn.ubuntu.com/3619-1/
 - https://usn.ubuntu.com/3619-2/
 - https://usn.ubuntu.com/3754-1/
 - https://www.debian.org/security/2018/dsa-4187
 - https://www.spinics.net/lists/linux-usb/msg163480.html
 - http://www.securityfocus.com/bid/102150
 - https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.8
 - https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.114
 - https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.71
 - https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git/commit/drivers/usb/usbip?id=635f545a7e8be7596b9b2b6a43cab6bbd5a88e43
 - https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html
 - https://secuniaresearch.flexerasoftware.com/advisories/77000/
 - https://secuniaresearch.flexerasoftware.com/secunia_research/2017-21/
 - https://usn.ubuntu.com/3619-1/
 - https://usn.ubuntu.com/3619-2/
 - https://usn.ubuntu.com/3754-1/
 - https://www.debian.org/security/2018/dsa-4187
 - https://www.spinics.net/lists/linux-usb/msg163480.html
 
Modified: 2024-11-21
CVE-2017-16913
The "stub_recv_cmd_submit()" function (drivers/usb/usbip/stub_rx.c) in the Linux Kernel before version 4.14.8, 4.9.71, and 4.4.114 when handling CMD_SUBMIT packets allows attackers to cause a denial of service (arbitrary memory allocation) via a specially crafted USB over IP packet.
- http://www.securityfocus.com/bid/102150
 - https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.8
 - https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.114
 - https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.71
 - https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git/commit/drivers/usb/usbip?id=c6688ef9f29762e65bce325ef4acd6c675806366
 - https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html
 - https://secuniaresearch.flexerasoftware.com/advisories/80601/
 - https://secuniaresearch.flexerasoftware.com/secunia_research/2017-21/
 - https://usn.ubuntu.com/3619-1/
 - https://usn.ubuntu.com/3619-2/
 - https://usn.ubuntu.com/3754-1/
 - https://www.debian.org/security/2018/dsa-4187
 - https://www.spinics.net/lists/linux-usb/msg163480.html
 - http://www.securityfocus.com/bid/102150
 - https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.8
 - https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.114
 - https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.71
 - https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git/commit/drivers/usb/usbip?id=c6688ef9f29762e65bce325ef4acd6c675806366
 - https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html
 - https://secuniaresearch.flexerasoftware.com/advisories/80601/
 - https://secuniaresearch.flexerasoftware.com/secunia_research/2017-21/
 - https://usn.ubuntu.com/3619-1/
 - https://usn.ubuntu.com/3619-2/
 - https://usn.ubuntu.com/3754-1/
 - https://www.debian.org/security/2018/dsa-4187
 - https://www.spinics.net/lists/linux-usb/msg163480.html
 
Modified: 2024-11-21
CVE-2017-16914
The "stub_send_ret_submit()" function (drivers/usb/usbip/stub_tx.c) in the Linux Kernel before version 4.14.8, 4.9.71, 4.1.49, and 4.4.107 allows attackers to cause a denial of service (NULL pointer dereference) via a specially crafted USB over IP packet.
- http://www.securityfocus.com/bid/102150
 - https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.1.49
 - https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.8
 - https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.107
 - https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.71
 - https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git/commit/drivers/usb/usbip?id=be6123df1ea8f01ee2f896a16c2b7be3e4557a5a
 - https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html
 - https://secuniaresearch.flexerasoftware.com/advisories/80722/
 - https://secuniaresearch.flexerasoftware.com/secunia_research/2017-21/
 - https://usn.ubuntu.com/3619-1/
 - https://usn.ubuntu.com/3619-2/
 - https://usn.ubuntu.com/3754-1/
 - https://www.debian.org/security/2018/dsa-4187
 - https://www.spinics.net/lists/linux-usb/msg163480.html
 - http://www.securityfocus.com/bid/102150
 - https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.1.49
 - https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.8
 - https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.107
 - https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.71
 - https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git/commit/drivers/usb/usbip?id=be6123df1ea8f01ee2f896a16c2b7be3e4557a5a
 - https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html
 - https://secuniaresearch.flexerasoftware.com/advisories/80722/
 - https://secuniaresearch.flexerasoftware.com/secunia_research/2017-21/
 - https://usn.ubuntu.com/3619-1/
 - https://usn.ubuntu.com/3619-2/
 - https://usn.ubuntu.com/3754-1/
 - https://www.debian.org/security/2018/dsa-4187
 - https://www.spinics.net/lists/linux-usb/msg163480.html
 
Modified: 2024-11-21
CVE-2018-5803
In the Linux Kernel before version 4.15.8, 4.14.25, 4.9.87, 4.4.121, 4.1.51, and 3.2.102, an error in the "_sctp_make_chunk()" function (net/sctp/sm_make_chunk.c) when handling SCTP packets length can be exploited to cause a kernel crash.
- https://access.redhat.com/errata/RHSA-2018:1854
 - https://access.redhat.com/errata/RHSA-2018:2948
 - https://access.redhat.com/errata/RHSA-2018:3083
 - https://access.redhat.com/errata/RHSA-2018:3096
 - https://access.redhat.com/errata/RHSA-2019:0641
 - https://cdn.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.102
 - https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.1.51
 - https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.25
 - https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.15.8
 - https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.121
 - https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.87
 - https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git/commit/?id=07f2c7ab6f8d0a7e7c5764c4e6cc9c52951b9d9c
 - https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html
 - https://secuniaresearch.flexerasoftware.com/advisories/81331/
 - https://secuniaresearch.flexerasoftware.com/secunia_research/2018-2/
 - https://usn.ubuntu.com/3654-1/
 - https://usn.ubuntu.com/3654-2/
 - https://usn.ubuntu.com/3656-1/
 - https://usn.ubuntu.com/3697-1/
 - https://usn.ubuntu.com/3697-2/
 - https://usn.ubuntu.com/3698-1/
 - https://usn.ubuntu.com/3698-2/
 - https://www.debian.org/security/2018/dsa-4187
 - https://www.debian.org/security/2018/dsa-4188
 - https://www.spinics.net/lists/linux-sctp/msg07036.html
 - https://www.spinics.net/lists/netdev/msg482523.html
 - https://access.redhat.com/errata/RHSA-2018:1854
 - https://access.redhat.com/errata/RHSA-2018:2948
 - https://access.redhat.com/errata/RHSA-2018:3083
 - https://access.redhat.com/errata/RHSA-2018:3096
 - https://access.redhat.com/errata/RHSA-2019:0641
 - https://cdn.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.102
 - https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.1.51
 - https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.25
 - https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.15.8
 - https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.121
 - https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.87
 - https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git/commit/?id=07f2c7ab6f8d0a7e7c5764c4e6cc9c52951b9d9c
 - https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html
 - https://secuniaresearch.flexerasoftware.com/advisories/81331/
 - https://secuniaresearch.flexerasoftware.com/secunia_research/2018-2/
 - https://usn.ubuntu.com/3654-1/
 - https://usn.ubuntu.com/3654-2/
 - https://usn.ubuntu.com/3656-1/
 - https://usn.ubuntu.com/3697-1/
 - https://usn.ubuntu.com/3697-2/
 - https://usn.ubuntu.com/3698-1/
 - https://usn.ubuntu.com/3698-2/
 - https://www.debian.org/security/2018/dsa-4187
 - https://www.debian.org/security/2018/dsa-4188
 - https://www.spinics.net/lists/linux-sctp/msg07036.html
 - https://www.spinics.net/lists/netdev/msg482523.html