Description
The sctp_do_peeloff function in net/sctp/socket.c in the Linux kernel before 4.14 does not check whether the intended netns is used in a peel-off action, which allows local users to cause a denial of service (use-after-free and system crash) or possibly have unspecified other impact via crafted system calls.
References (16)
Core 16
Core References
Issue Tracking, Patch, Third Party Advisory x_refsource_confirm
https://bugzilla.redhat.com/show_bug.cgi?id=1513345
Issue Tracking, Patch, Third Party Advisory x_refsource_confirm
https://github.com/torvalds/linux/commit/df80cd9b28b9ebaa284a41df611dbf3a2d05ca74
Mailing List, Third Party Advisory mailing-list
x_refsource_mlist
https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html
Third Party Advisory vendor-advisory
x_refsource_ubuntu
https://usn.ubuntu.com/3583-2/
Third Party Advisory vendor-advisory
x_refsource_suse
http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html
Issue Tracking, Patch, Third Party Advisory x_refsource_confirm
https://patchwork.ozlabs.org/patch/827077/
Third Party Advisory vendor-advisory
x_refsource_ubuntu
https://usn.ubuntu.com/3582-1/
Third Party Advisory x_refsource_confirm
https://source.android.com/security/bulletin/pixel/2018-04-01
Third Party Advisory vendor-advisory
x_refsource_ubuntu
https://usn.ubuntu.com/3583-1/
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/101877
Third Party Advisory vendor-advisory
x_refsource_ubuntu
https://usn.ubuntu.com/3581-1/
Third Party Advisory vendor-advisory
x_refsource_ubuntu
https://usn.ubuntu.com/3581-3/
Third Party Advisory vendor-advisory
x_refsource_ubuntu
https://usn.ubuntu.com/3581-2/
Issue Tracking, Mailing List, Third Party Advisory x_refsource_confirm
http://seclists.org/oss-sec/2017/q4/282
Issue Tracking, Patch, Vendor Advisory x_refsource_confirm
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=df80cd9b28b9ebaa284a41df611dbf3a2d05ca74
Third Party Advisory vendor-advisory
x_refsource_ubuntu
https://usn.ubuntu.com/3582-2/
Scores
CVSS v3
7.8
EPSS
0.0004
EPSS Percentile
11.0%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-416
Status
published
Products (8)
canonical/ubuntu_linux
12.04
canonical/ubuntu_linux
14.04
canonical/ubuntu_linux
16.04
canonical/ubuntu_linux
17.10
debian/debian_linux
7.0
linux/linux_kernel
< 3.2.96
n/a/Linux kernel before 4.14-rc6
Linux kernel before 4.14-rc6
suse/linux_enterprise_server
11 sp4
Published
Nov 15, 2017
Tracked Since
Feb 18, 2026