Description: Use-after-free in sctp triggered remotely References: http://www.openwall.com/lists/oss-security/2015/01/29/13 https://git.kernel.org/linus/600ddd6825543962fb807884169e57b580dba208 Notes: Bugs: upstream: released (3.19-rc7) [600ddd6825543962fb807884169e57b580dba208] 2.6.32-upstream-stable: released (2.6.32.66) sid: released (3.16.7-ckt4-3) [bugfix/all/net-sctp-fix-slab-corruption-from-use-after-free-on-.patch] 3.2-wheezy-security: released (3.2.65-1+deb7u2) [bugfix/all/net-sctp-fix-slab-corruption-from-use-after-free-on-init-collisions.patch] 2.6.32-squeeze-security: released (2.6.32-48squeeze11) [bugfix/all/net-sctp-fix-slab-corruption-from-use-after-free-on-.patch] 3.16-upstream-stable: released (3.16.7-ckt6) 3.2-upstream-stable: released (3.2.67) [net-sctp-fix-slab-corruption-from-use-after-free-on-init-collisions.patch]