Vulnerability Description
Use-after-free vulnerability in the sctp_assoc_update function in net/sctp/associola.c in the Linux kernel before 3.18.8 allows remote attackers to cause a denial of service (slab corruption and panic) or possibly have unspecified other impact by triggering an INIT collision that leads to improper handling of shared-key data.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 2.6.24, < 3.2.67 |
| Canonical | Ubuntu Linux | 12.04 |
| Debian | Debian Linux | 7.0 |
References
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=
- http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00001.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-security-announce/2015-09/msg00004.htmlMailing ListThird Party Advisory
- http://rhn.redhat.com/errata/RHSA-2015-0726.htmlThird Party Advisory
- http://rhn.redhat.com/errata/RHSA-2015-0751.htmlThird Party Advisory
- http://rhn.redhat.com/errata/RHSA-2015-0782.htmlThird Party Advisory
- http://rhn.redhat.com/errata/RHSA-2015-0864.htmlThird Party Advisory
- http://rhn.redhat.com/errata/RHSA-2015-1082.htmlThird Party Advisory
- http://www.debian.org/security/2015/dsa-3170Third Party Advisory
- http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.18.8Vendor Advisory
- http://www.openwall.com/lists/oss-security/2015/01/29/15Mailing ListThird Party Advisory
- http://www.securityfocus.com/bid/72356Third Party AdvisoryVDB Entry
- http://www.securitytracker.com/id/1032172Third Party AdvisoryVDB Entry
- http://www.ubuntu.com/usn/USN-2541-1Third Party Advisory
- http://www.ubuntu.com/usn/USN-2542-1Third Party Advisory
FAQ
What is CVE-2015-1421?
CVE-2015-1421 is a vulnerability with a CVSS score of 10.0 (HIGH). Use-after-free vulnerability in the sctp_assoc_update function in net/sctp/associola.c in the Linux kernel before 3.18.8 allows remote attackers to cause a denial of service (slab corruption and panic...
How severe is CVE-2015-1421?
CVE-2015-1421 has been rated HIGH with a CVSS base score of 10.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2015-1421?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel, Canonical Ubuntu Linux, Debian Debian Linux.