CVE-2017-15115

CVSS v3.1 7.8 (High)
78% Progress
CVSS v2.0 7.2 (High)
72% Progress
EPSS 0.04 % (11th)
0.04% Progress
Affected Products 4
Advisories 42

The sctp_do_peeloff function in net/sctp/socket.c in the Linux kernel before 4.14 does not check whether the intended netns is used in a peel-off action, which allows local users to cause a denial of service (use-after-free and system crash) or possibly have unspecified other impact via crafted system calls.

Weaknesses
CWE-416
Use After Free
CVE Status
PUBLISHED
CNA
Red Hat, Inc.
Published Date
2017-11-15 21:29:00
(6 years ago)
Updated Date
2023-01-19 15:46:55
(20 months ago)

Affected Products

Loading...
Loading...

Configuration #1

    CPE23 From Up To
  Linux Kernel prior 3.2.96 version cpe:2.3:o:linux:linux_kernel < 3.2.96
  Linux Kernel from 3.3 version and prior 3.16.51 version cpe:2.3:o:linux:linux_kernel >= 3.3 < 3.16.51
  Linux Kernel from 3.17 version and prior 3.18.84 version cpe:2.3:o:linux:linux_kernel >= 3.17 < 3.18.84
  Linux Kernel from 3.19 version and prior 4.1.47 version cpe:2.3:o:linux:linux_kernel >= 3.19 < 4.1.47
  Linux Kernel from 4.2 version and prior 4.4.100 version cpe:2.3:o:linux:linux_kernel >= 4.2 < 4.4.100
  Linux Kernel from 4.5 version and prior 4.9.65 version cpe:2.3:o:linux:linux_kernel >= 4.5 < 4.9.65
  Linux Kernel from 4.10 version and prior 4.13.16 version cpe:2.3:o:linux:linux_kernel >= 4.10 < 4.13.16

Configuration #2

    CPE23 From Up To
  Debian Linux 7.0 cpe:2.3:o:debian:debian_linux:7.0

Configuration #3

    CPE23 From Up To
  Suse Linux Enterprise Server 11 SP4 cpe:2.3:o:suse:linux_enterprise_server:11:sp4

Configuration #4

    CPE23 From Up To
  Canonical Ubuntu Linux 12.04 cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm
  Canonical Ubuntu Linux 14.04 cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts
  Canonical Ubuntu Linux 16.04 cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts
  Canonical Ubuntu Linux 17.10 cpe:2.3:o:canonical:ubuntu_linux:17.10
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...