The sctp_do_peeloff function in net/sctp/socket.c in the Linux kernel before 4.14 does not check whether the intended netns is used in a peel-off action, which allows local users to cause a denial of service (use-after-free and system crash) or possibly have unspecified other impact via crafted system calls.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
History
No history.
Information
Published : 2017-11-15 21:29
Updated : 2024-02-04 19:29
NVD link : CVE-2017-15115
Mitre link : CVE-2017-15115
CVE.ORG link : CVE-2017-15115
JSON object : View
Products Affected
suse
- linux_enterprise_server
debian
- debian_linux
canonical
- ubuntu_linux
linux
- linux_kernel
CWE
CWE-416
Use After Free