Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2015-1421

Опубликовано: 22 янв. 2015
Источник: redhat
CVSS2: 7.1
EPSS Средний

Описание

Use-after-free vulnerability in the sctp_assoc_update function in net/sctp/associola.c in the Linux kernel before 3.18.8 allows remote attackers to cause a denial of service (slab corruption and panic) or possibly have unspecified other impact by triggering an INIT collision that leads to improper handling of shared-key data.

A use-after-free flaw was found in the way the Linux kernel's SCTP implementation handled authentication key reference counting during INIT collisions. A remote attacker could use this flaw to crash the system or, potentially, escalate their privileges on the system.

Отчет

This issue did not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 5. This issue affects the Linux kernel packages as shipped with Red Hat Enterprise Linux 6 and Red Hat Enterprise MRG 2. Future Linux kernel updates for the respective releases may address this issue.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5kernelNot affected
Red Hat Enterprise Linux 6kernelFixedRHSA-2015:086421.04.2015
Red Hat Enterprise Linux 6.2 Advanced Update SupportkernelFixedRHSA-2015:108209.06.2015
Red Hat Enterprise Linux 6.4 Advanced Update SupportkernelFixedRHSA-2015:103027.05.2015
Red Hat Enterprise Linux 6.5 Extended Update SupportkernelFixedRHSA-2015:078207.04.2015
Red Hat Enterprise Linux 7kernel-rtFixedRHSA-2015:072726.03.2015
Red Hat Enterprise Linux 7kernelFixedRHSA-2015:072626.03.2015
Red Hat Enterprise MRG 2kernel-rtFixedRHSA-2015:075130.03.2015

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-416
https://bugzilla.redhat.com/show_bug.cgi?id=1196581kernel: net: slab corruption from use after free on INIT collisions

EPSS

Процентиль: 96%
0.25935
Средний

7.1 High

CVSS2

Связанные уязвимости

ubuntu
больше 10 лет назад

Use-after-free vulnerability in the sctp_assoc_update function in net/sctp/associola.c in the Linux kernel before 3.18.8 allows remote attackers to cause a denial of service (slab corruption and panic) or possibly have unspecified other impact by triggering an INIT collision that leads to improper handling of shared-key data.

nvd
больше 10 лет назад

Use-after-free vulnerability in the sctp_assoc_update function in net/sctp/associola.c in the Linux kernel before 3.18.8 allows remote attackers to cause a denial of service (slab corruption and panic) or possibly have unspecified other impact by triggering an INIT collision that leads to improper handling of shared-key data.

debian
больше 10 лет назад

Use-after-free vulnerability in the sctp_assoc_update function in net/ ...

suse-cvrf
около 10 лет назад

Security update for kgraft-patch-SLE12_Update_1, kgraft-patch-SLE12_Update_2

github
около 3 лет назад

Use-after-free vulnerability in the sctp_assoc_update function in net/sctp/associola.c in the Linux kernel before 3.18.8 allows remote attackers to cause a denial of service (slab corruption and panic) or possibly have unspecified other impact by triggering an INIT collision that leads to improper handling of shared-key data.

EPSS

Процентиль: 96%
0.25935
Средний

7.1 High

CVSS2