First published: Thu Aug 27 2015(Updated: )
A NULL pointer dereference flaw was found in SCTP implementation allowing the local user to cause system DoS. Creation of multiple sockets in parallel when system doesn't have SCTP module loaded can lead to kernel panic. Upstream patch: <a href="http://patchwork.ozlabs.org/patch/515996/">http://patchwork.ozlabs.org/patch/515996/</a>
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Linux kernel | <=4.2.2 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.115-1 6.1.119-1 6.11.10-1 6.12.5-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2015-5283.
The sctp_init function in net/sctp/protocol.c in the Linux kernel before 4.2.3 has an incorrect sequence of protocol-initialization steps, which allows local users to cause a denial of service (panic or memory corruption) by creating SCTP sockets before all of the steps have finished.
This vulnerability can be exploited by local users to cause a denial of service (panic or memory corruption) by creating SCTP sockets before all of the initialization steps have finished.
The severity of CVE-2015-5283 is medium.
You can find more information about CVE-2015-5283 at the following references: [Reference 1](http://patchwork.ozlabs.org/patch/515996/), [Reference 2](https://bugzilla.redhat.com/show_bug.cgi/show_bug.cgi?id=1279290), [Reference 3](https://rhn.redhat.com/errata/RHSA-2015-2411.html).