The sctp_do_peeloff function in net/sctp/socket.c in the Linux kernel before 4.14 does not check whether the intended netns is used in a peel-off action, which allows local users to cause a denial of service (use-after-free and system crash) or possibly have unspecified other impact via crafted system calls.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Information
Published : 2017-11-15 13:29
Updated : 2023-01-19 07:46
NVD link : CVE-2017-15115
Mitre link : CVE-2017-15115
JSON object : View
CWE
CWE-416
Use After Free
Products Affected
debian
- debian_linux
canonical
- ubuntu_linux
suse
- linux_enterprise_server
linux
- linux_kernel