CVE-2015-5283

Linux kernel <4.2.3 - DoS

Title source: llm
STIX 2.1

Description

The sctp_init function in net/sctp/protocol.c in the Linux kernel before 4.2.3 has an incorrect sequence of protocol-initialization steps, which allows local users to cause a denial of service (panic or memory corruption) by creating SCTP sockets before all of the steps have finished.

References (16)

Core 16
Core References
Third Party Advisory vendor-advisory x_refsource_debian
http://www.debian.org/security/2015/dsa-3372
Issue Tracking x_refsource_confirm
https://bugzilla.redhat.com/show_bug.cgi?id=1257528
Vendor Advisory vendor-advisory x_refsource_ubuntu
http://www.ubuntu.com/usn/USN-2826-1
Third Party Advisory, VDB Entry vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/77058
Third Party Advisory x_refsource_confirm
https://security-tracker.debian.org/tracker/CVE-2015-5283
Vendor Advisory vendor-advisory x_refsource_ubuntu
http://www.ubuntu.com/usn/USN-2829-2
Vendor Advisory vendor-advisory x_refsource_ubuntu
http://www.ubuntu.com/usn/USN-2829-1
Vendor Advisory vendor-advisory x_refsource_ubuntu
http://www.ubuntu.com/usn/USN-2823-1
Third Party Advisory, VDB Entry vdb-entry x_refsource_sectrack
http://www.securitytracker.com/id/1033808
Exploit x_refsource_confirm
http://patchwork.ozlabs.org/patch/515996/

Scores

EPSS 0.0010
EPSS Percentile 27.8%

Details

CWE
CWE-119
Status published
Products (1)
linux/linux_kernel < 4.2.2
Published Oct 19, 2015
Tracked Since Feb 18, 2026