Vulnerability & Exploit Database

Displaying all 6 entries

Results for: CVE-2017-15115 Back to search

Ubuntu: (Multiple Advisories) (CVE-2017-15115): Linux kernel (Trusty HWE) vulnerabilities Vulnerability

  • Severity: 7
  • Published: November 15, 2017

The sctp_do_peeloff function in net/sctp/socket.c in the Linux kernel before 4.14 does not check whether the intended netns is used in a peel-off action, which allows local users to cause a denial of service (use-after-free and system crash) or possibly have unspecified other impact via crafted system calls.

SUSE: CVE-2017-15115: SUSE Linux Security Advisory Vulnerability

  • Severity: 7
  • Published: November 15, 2017

The sctp_do_peeloff function in net/sctp/socket.c in the Linux kernel before 4.14 does not check whether the intended netns is used in a peel-off action, which allows local users to cause a denial of service (use-after-free and system crash) or possibly have unspecified other impact via crafted system calls.

Huawei EulerOS: CVE-2017-15115: kernel security update Vulnerability

  • Severity: 7
  • Published: November 15, 2017

The sctp_do_peeloff function in net/sctp/socket.c in the Linux kernel before 4.14 does not check whether the intended netns is used in a peel-off action, which allows local users to cause a denial of service (use-after-free and system crash) or possibly have unspecified other impact via crafted system calls.

Huawei EulerOS: CVE-2017-15115: kernel security update Vulnerability

  • Severity: 7
  • Published: November 15, 2017

The sctp_do_peeloff function in net/sctp/socket.c in the Linux kernel before 4.14 does not check whether the intended netns is used in a peel-off action, which allows local users to cause a denial of service (use-after-free and system crash) or possibly have unspecified other impact via crafted system calls.

Amazon Linux AMI: CVE-2017-15115: Security patch for kernel (ALAS-2017-937) Vulnerability

  • Severity: 7
  • Published: November 15, 2017

The sctp_do_peeloff function in net/sctp/socket.c in the Linux kernel before 4.14 does not check whether the intended netns is used in a peel-off action, which allows local users to cause a denial of service (use-after-free and system crash) or possibly have unspecified other impact via crafted system calls.