CVE-2017-15115

The sctp_do_peeloff function in net/sctp/socket.c in the Linux kernel before 4.14 does not check whether the intended netns is used in a peel-off action, which allows local users to cause a denial of service (use-after-free and system crash) or possibly have unspecified other impact via crafted system calls.
References
Link Resource
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=df80cd9b28b9ebaa284a41df611dbf3a2d05ca74 Issue Tracking Patch Vendor Advisory
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html Third Party Advisory
http://seclists.org/oss-sec/2017/q4/282 Issue Tracking Mailing List Third Party Advisory
http://www.securityfocus.com/bid/101877 Third Party Advisory VDB Entry
https://bugzilla.redhat.com/show_bug.cgi?id=1513345 Issue Tracking Patch Third Party Advisory
https://github.com/torvalds/linux/commit/df80cd9b28b9ebaa284a41df611dbf3a2d05ca74 Issue Tracking Patch Third Party Advisory
https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html Mailing List Third Party Advisory
https://patchwork.ozlabs.org/patch/827077/ Issue Tracking Patch Third Party Advisory
https://source.android.com/security/bulletin/pixel/2018-04-01 Third Party Advisory
https://usn.ubuntu.com/3581-1/ Third Party Advisory
https://usn.ubuntu.com/3581-2/ Third Party Advisory
https://usn.ubuntu.com/3581-3/ Third Party Advisory
https://usn.ubuntu.com/3582-1/ Third Party Advisory
https://usn.ubuntu.com/3582-2/ Third Party Advisory
https://usn.ubuntu.com/3583-1/ Third Party Advisory
https://usn.ubuntu.com/3583-2/ Third Party Advisory
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=df80cd9b28b9ebaa284a41df611dbf3a2d05ca74 Issue Tracking Patch Vendor Advisory
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html Third Party Advisory
http://seclists.org/oss-sec/2017/q4/282 Issue Tracking Mailing List Third Party Advisory
http://www.securityfocus.com/bid/101877 Third Party Advisory VDB Entry
https://bugzilla.redhat.com/show_bug.cgi?id=1513345 Issue Tracking Patch Third Party Advisory
https://github.com/torvalds/linux/commit/df80cd9b28b9ebaa284a41df611dbf3a2d05ca74 Issue Tracking Patch Third Party Advisory
https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html Mailing List Third Party Advisory
https://patchwork.ozlabs.org/patch/827077/ Issue Tracking Patch Third Party Advisory
https://source.android.com/security/bulletin/pixel/2018-04-01 Third Party Advisory
https://usn.ubuntu.com/3581-1/ Third Party Advisory
https://usn.ubuntu.com/3581-2/ Third Party Advisory
https://usn.ubuntu.com/3581-3/ Third Party Advisory
https://usn.ubuntu.com/3582-1/ Third Party Advisory
https://usn.ubuntu.com/3582-2/ Third Party Advisory
https://usn.ubuntu.com/3583-1/ Third Party Advisory
https://usn.ubuntu.com/3583-2/ Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*

History

21 Nov 2024, 03:14

Type Values Removed Values Added
References () http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=df80cd9b28b9ebaa284a41df611dbf3a2d05ca74 - Issue Tracking, Patch, Vendor Advisory () http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=df80cd9b28b9ebaa284a41df611dbf3a2d05ca74 - Issue Tracking, Patch, Vendor Advisory
References () http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html - Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html - Third Party Advisory
References () http://seclists.org/oss-sec/2017/q4/282 - Issue Tracking, Mailing List, Third Party Advisory () http://seclists.org/oss-sec/2017/q4/282 - Issue Tracking, Mailing List, Third Party Advisory
References () http://www.securityfocus.com/bid/101877 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/101877 - Third Party Advisory, VDB Entry
References () https://bugzilla.redhat.com/show_bug.cgi?id=1513345 - Issue Tracking, Patch, Third Party Advisory () https://bugzilla.redhat.com/show_bug.cgi?id=1513345 - Issue Tracking, Patch, Third Party Advisory
References () https://github.com/torvalds/linux/commit/df80cd9b28b9ebaa284a41df611dbf3a2d05ca74 - Issue Tracking, Patch, Third Party Advisory () https://github.com/torvalds/linux/commit/df80cd9b28b9ebaa284a41df611dbf3a2d05ca74 - Issue Tracking, Patch, Third Party Advisory
References () https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html - Mailing List, Third Party Advisory
References () https://patchwork.ozlabs.org/patch/827077/ - Issue Tracking, Patch, Third Party Advisory () https://patchwork.ozlabs.org/patch/827077/ - Issue Tracking, Patch, Third Party Advisory
References () https://source.android.com/security/bulletin/pixel/2018-04-01 - Third Party Advisory () https://source.android.com/security/bulletin/pixel/2018-04-01 - Third Party Advisory
References () https://usn.ubuntu.com/3581-1/ - Third Party Advisory () https://usn.ubuntu.com/3581-1/ - Third Party Advisory
References () https://usn.ubuntu.com/3581-2/ - Third Party Advisory () https://usn.ubuntu.com/3581-2/ - Third Party Advisory
References () https://usn.ubuntu.com/3581-3/ - Third Party Advisory () https://usn.ubuntu.com/3581-3/ - Third Party Advisory
References () https://usn.ubuntu.com/3582-1/ - Third Party Advisory () https://usn.ubuntu.com/3582-1/ - Third Party Advisory
References () https://usn.ubuntu.com/3582-2/ - Third Party Advisory () https://usn.ubuntu.com/3582-2/ - Third Party Advisory
References () https://usn.ubuntu.com/3583-1/ - Third Party Advisory () https://usn.ubuntu.com/3583-1/ - Third Party Advisory
References () https://usn.ubuntu.com/3583-2/ - Third Party Advisory () https://usn.ubuntu.com/3583-2/ - Third Party Advisory

Information

Published : 2017-11-15 21:29

Updated : 2024-11-21 03:14


NVD link : CVE-2017-15115

Mitre link : CVE-2017-15115

CVE.ORG link : CVE-2017-15115


JSON object : View

Products Affected

suse

  • linux_enterprise_server

debian

  • debian_linux

linux

  • linux_kernel

canonical

  • ubuntu_linux
CWE
CWE-416

Use After Free