The sctp_do_peeloff function in net/sctp/socket.c in the Linux kernel before 4.14 does not check whether the intended netns is used in a peel-off action, which allows local users to cause a denial of service (use-after-free and system crash) or possibly have unspecified other impact via crafted system calls.
| Software | From | Fixed in |
|---|---|---|
| linux / linux_kernel | - | 3.2.96 |
| linux / linux_kernel | 3.3 | 3.16.51 |
| linux / linux_kernel | 3.17 | 3.18.84 |
| linux / linux_kernel | 3.19 | 4.1.47 |
| linux / linux_kernel | 4.2 | 4.4.100 |
| linux / linux_kernel | 4.5 | 4.9.65 |
| linux / linux_kernel | 4.10 | 4.13.16 |
| debian / debian_linux | 7.0 | 7.0.x |
| suse / linux_enterprise_server | 11-sp4 | 11-sp4.x |
| canonical / ubuntu_linux | 16.04 | 16.04.x |
| canonical / ubuntu_linux | 14.04 | 14.04.x |
| canonical / ubuntu_linux | 12.04 | 12.04.x |
| canonical / ubuntu_linux | 17.10 | 17.10.x |