CVE-2017-15115
Description
The sctp_do_peeloff function in net/sctp/socket.c in the Linux kernel before 4.14 does not check whether the intended netns is used in a peel-off action, which allows local users to cause a denial of service (use-after-free and system crash) or possibly have unspecified other impact via crafted system calls.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
The Linux kernel before 4.14 does not validate netns in `sctp_do_peeloff`, allowing local users to cause a use-after-free crash.
Vulnerability
The vulnerability resides in the sctp_do_peeloff function in net/sctp/socket.c. In the Linux kernel before version 4.14, this function does not check whether the intended network namespace (netns) is used during a SCTP peel-off operation. This lack of validation allows a local user to perform a peel-off action on a socket in a different network namespace, leading to a use-after-free condition [4].
Exploitation
An attacker must be a local user and able to issue crafted system calls. Specifically, the attacker must invoke the SCTP_PEELOFF operation on a socket association that belongs to a different network namespace. The kernel fails to verify the netns, allowing the attacker to trigger the use-after-free by freeing the socket while it is still in use [4]. No special privileges beyond local access are required.
Impact
Successful exploitation causes a use-after-free in the kernel, which results in a denial of service (system crash). The description also notes the possibility of unspecified other impact, which could include arbitrary code execution or privilege escalation, though the primary impact is system instability [4].
Mitigation
A fix is available in Linux kernel version 4.14 and later. Distributions such as Ubuntu and Red Hat have backported the fix: Ubuntu via USN-3583-1 and USN-3583-2 (for Trusty HWE/12.04 ESM) [2][3], and Red Hat addressed it in their updates. Users should update to the latest patched kernel version.
AI Insight generated on May 22, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
100cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*+ 3 more
- cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
- cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:suse:linux_enterprise_server:11:sp4:*:*:*:*:*:*
- osv-coords93 versionspkg:rpm/suse/kernel-bigmem&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4pkg:rpm/suse/kernel-bigmem&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4pkg:rpm/suse/kernel-bigsmp&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP3-LTSSpkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP2pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP3pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20High%20Availability%20Extension%2012%20SP2pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20High%20Availability%20Extension%2012%20SP3pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Point%20of%20Sale%2011%20SP3pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP3-LTSSpkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1-LTSSpkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%2012-LTSSpkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%20for%20Raspberry%20Pi%2012%20SP2pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Workstation%20Extension%2012%20SP2pkg:rpm/suse/kernel-default&distro=SUSE%20Linux%20Enterprise%20Workstation%20Extension%2012%20SP3pkg:rpm/suse/kernel-default&distro=SUSE%20OpenStack%20Cloud%206pkg:rpm/suse/kernel-docs&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2011%20SP4pkg:rpm/suse/kernel-docs&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP2pkg:rpm/suse/kernel-docs&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP3pkg:rpm/suse/kernel-ec2&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Public%20Cloud%2012pkg:rpm/suse/kernel-ec2&distro=SUSE%20Linux%20Enterprise%20Point%20of%20Sale%2011%20SP3pkg:rpm/suse/kernel-ec2&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP3-LTSSpkg:rpm/suse/kernel-ec2&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4pkg:rpm/suse/kernel-ec2&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4pkg:rpm/suse/kernel-obs-build&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP2pkg:rpm/suse/kernel-obs-build&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP3pkg:rpm/suse/kernel-pae&distro=SUSE%20Linux%20Enterprise%20Point%20of%20Sale%2011%20SP3pkg:rpm/suse/kernel-pae&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP3-LTSSpkg:rpm/suse/kernel-pae&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4pkg:rpm/suse/kernel-pae&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4pkg:rpm/suse/kernel-ppc64&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4pkg:rpm/suse/kernel-ppc64&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4pkg:rpm/suse/kernel-rt_debug&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2012%20SP2pkg:rpm/suse/kernel-rt&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2011%20SP4pkg:rpm/suse/kernel-rt&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2012%20SP2pkg:rpm/suse/kernel-rt_trace&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2011%20SP4pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP2pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP3pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Point%20of%20Sale%2011%20SP3pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP3-LTSSpkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1-LTSSpkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%2012-LTSSpkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%20for%20Raspberry%20Pi%2012%20SP2pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2pkg:rpm/suse/kernel-source&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3pkg:rpm/suse/kernel-source&distro=SUSE%20OpenStack%20Cloud%206pkg:rpm/suse/kernel-source-rt&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2011%20SP4pkg:rpm/suse/kernel-source-rt&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2012%20SP2pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP2pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP3pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Point%20of%20Sale%2011%20SP3pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP3-LTSSpkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1-LTSSpkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP3pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%2012-LTSSpkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%20for%20Raspberry%20Pi%2012%20SP2pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP2pkg:rpm/suse/kernel-syms&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP3pkg:rpm/suse/kernel-syms&distro=SUSE%20OpenStack%20Cloud%206pkg:rpm/suse/kernel-syms-rt&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2011%20SP4pkg:rpm/suse/kernel-syms-rt&distro=SUSE%20Linux%20Enterprise%20Real%20Time%2012%20SP2pkg:rpm/suse/kernel-trace&distro=SUSE%20Linux%20Enterprise%20Point%20of%20Sale%2011%20SP3pkg:rpm/suse/kernel-trace&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP3-LTSSpkg:rpm/suse/kernel-trace&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4pkg:rpm/suse/kernel-trace&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4pkg:rpm/suse/kernel-xen&distro=SUSE%20Linux%20Enterprise%20Point%20of%20Sale%2011%20SP3pkg:rpm/suse/kernel-xen&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP3-LTSSpkg:rpm/suse/kernel-xen&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP4pkg:rpm/suse/kernel-xen&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1-LTSSpkg:rpm/suse/kernel-xen&distro=SUSE%20Linux%20Enterprise%20Server%2012-LTSSpkg:rpm/suse/kernel-xen&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2011%20SP4pkg:rpm/suse/kernel-xen&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/kernel-xen&distro=SUSE%20OpenStack%20Cloud%206pkg:rpm/suse/kgraft-patch-SLE12-SP1_Update_24&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1-LTSSpkg:rpm/suse/kgraft-patch-SLE12-SP1_Update_24&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1pkg:rpm/suse/kgraft-patch-SLE12-SP1_Update_24&distro=SUSE%20OpenStack%20Cloud%206pkg:rpm/suse/kgraft-patch-SLE12-SP2_Update_16&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012pkg:rpm/suse/kgraft-patch-SLE12-SP3_Update_6&distro=SUSE%20Linux%20Enterprise%20Live%20Patching%2012%20SP3
< 3.0.101-108.21.1+ 92 more
- (no CPE)range: < 3.0.101-108.21.1
- (no CPE)range: < 3.0.101-108.21.1
- (no CPE)range: < 3.0.101-0.47.106.11.1
- (no CPE)range: < 4.4.103-92.53.1
- (no CPE)range: < 4.4.103-6.33.1
- (no CPE)range: < 4.4.103-92.53.1
- (no CPE)range: < 4.4.103-6.33.1
- (no CPE)range: < 3.0.101-0.47.106.11.1
- (no CPE)range: < 3.0.101-0.47.106.11.1
- (no CPE)range: < 3.0.101-108.21.1
- (no CPE)range: < 3.12.74-60.64.69.1
- (no CPE)range: < 4.4.103-92.53.1
- (no CPE)range: < 4.4.103-6.33.1
- (no CPE)range: < 3.12.61-52.111.1
- (no CPE)range: < 4.4.103-92.53.1
- (no CPE)range: < 3.0.101-108.21.1
- (no CPE)range: < 3.12.74-60.64.69.1
- (no CPE)range: < 4.4.103-92.53.1
- (no CPE)range: < 4.4.103-6.33.1
- (no CPE)range: < 4.4.103-92.53.1
- (no CPE)range: < 4.4.103-6.33.1
- (no CPE)range: < 3.12.74-60.64.69.1
- (no CPE)range: < 3.0.101-108.21.2
- (no CPE)range: < 4.4.103-92.53.1
- (no CPE)range: < 4.4.103-6.33.1
- (no CPE)range: < 3.12.74-60.64.69.1
- (no CPE)range: < 3.0.101-0.47.106.11.1
- (no CPE)range: < 3.0.101-0.47.106.11.1
- (no CPE)range: < 3.0.101-108.21.1
- (no CPE)range: < 3.0.101-108.21.1
- (no CPE)range: < 4.4.103-92.53.1
- (no CPE)range: < 4.4.103-6.33.1
- (no CPE)range: < 3.0.101-0.47.106.11.1
- (no CPE)range: < 3.0.101-0.47.106.11.1
- (no CPE)range: < 3.0.101-108.21.1
- (no CPE)range: < 3.0.101-108.21.1
- (no CPE)range: < 3.0.101-108.21.1
- (no CPE)range: < 3.0.101-108.21.1
- (no CPE)range: < 4.4.104-24.1
- (no CPE)range: < 3.0.101.rt130-69.14.1
- (no CPE)range: < 4.4.104-24.1
- (no CPE)range: < 3.0.101.rt130-69.14.1
- (no CPE)range: < 4.4.103-92.53.1
- (no CPE)range: < 4.4.103-6.33.1
- (no CPE)range: < 3.0.101-0.47.106.11.1
- (no CPE)range: < 3.0.101-0.47.106.11.1
- (no CPE)range: < 3.0.101-108.21.1
- (no CPE)range: < 3.12.74-60.64.69.1
- (no CPE)range: < 4.4.103-92.53.1
- (no CPE)range: < 4.4.103-6.33.1
- (no CPE)range: < 3.12.61-52.111.1
- (no CPE)range: < 4.4.103-92.53.1
- (no CPE)range: < 3.0.101-108.21.1
- (no CPE)range: < 3.12.74-60.64.69.1
- (no CPE)range: < 4.4.103-92.53.1
- (no CPE)range: < 4.4.103-6.33.1
- (no CPE)range: < 3.12.74-60.64.69.1
- (no CPE)range: < 3.0.101.rt130-69.14.1
- (no CPE)range: < 4.4.104-24.1
- (no CPE)range: < 4.4.103-92.53.1
- (no CPE)range: < 4.4.103-6.33.1
- (no CPE)range: < 3.0.101-0.47.106.11.1
- (no CPE)range: < 3.0.101-0.47.106.11.1
- (no CPE)range: < 3.0.101-108.21.1
- (no CPE)range: < 3.12.74-60.64.69.1
- (no CPE)range: < 4.4.103-92.53.1
- (no CPE)range: < 4.4.103-6.33.1
- (no CPE)range: < 3.12.61-52.111.1
- (no CPE)range: < 4.4.103-92.53.1
- (no CPE)range: < 3.0.101-108.21.1
- (no CPE)range: < 3.12.74-60.64.69.1
- (no CPE)range: < 4.4.103-92.53.1
- (no CPE)range: < 4.4.103-6.33.1
- (no CPE)range: < 3.12.74-60.64.69.1
- (no CPE)range: < 3.0.101.rt130-69.14.1
- (no CPE)range: < 4.4.104-24.1
- (no CPE)range: < 3.0.101-0.47.106.11.1
- (no CPE)range: < 3.0.101-0.47.106.11.1
- (no CPE)range: < 3.0.101-108.21.1
- (no CPE)range: < 3.0.101-108.21.1
- (no CPE)range: < 3.0.101-0.47.106.11.1
- (no CPE)range: < 3.0.101-0.47.106.11.1
- (no CPE)range: < 3.0.101-108.21.1
- (no CPE)range: < 3.12.74-60.64.69.1
- (no CPE)range: < 3.12.61-52.111.1
- (no CPE)range: < 3.0.101-108.21.1
- (no CPE)range: < 3.12.74-60.64.69.1
- (no CPE)range: < 3.12.74-60.64.69.1
- (no CPE)range: < 1-2.3.1
- (no CPE)range: < 1-2.3.1
- (no CPE)range: < 1-2.3.1
- (no CPE)range: < 1-3.3.1
- (no CPE)range: < 1-4.3.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
16- git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/nvdIssue TrackingPatchVendor Advisory
- bugzilla.redhat.com/show_bug.cginvdIssue TrackingPatchThird Party Advisory
- github.com/torvalds/linux/commit/df80cd9b28b9ebaa284a41df611dbf3a2d05ca74nvdIssue TrackingPatchThird Party Advisory
- patchwork.ozlabs.org/patch/827077/nvdIssue TrackingPatchThird Party Advisory
- lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.htmlnvdThird Party Advisory
- seclists.org/oss-sec/2017/q4/282nvdIssue TrackingMailing ListThird Party Advisory
- www.securityfocus.com/bid/101877nvdThird Party AdvisoryVDB Entry
- lists.debian.org/debian-lts-announce/2017/12/msg00004.htmlnvdMailing ListThird Party Advisory
- source.android.com/security/bulletin/pixel/2018-04-01nvdThird Party Advisory
- usn.ubuntu.com/3581-1/nvdThird Party Advisory
- usn.ubuntu.com/3581-2/nvdThird Party Advisory
- usn.ubuntu.com/3581-3/nvdThird Party Advisory
- usn.ubuntu.com/3582-1/nvdThird Party Advisory
- usn.ubuntu.com/3582-2/nvdThird Party Advisory
- usn.ubuntu.com/3583-1/nvdThird Party Advisory
- usn.ubuntu.com/3583-2/nvdThird Party Advisory
News mentions
0No linked articles in our index yet.