The sctpdopeeloff function in net/sctp/socket.c in the Linux kernel before 4.14 does not check whether the intended netns is used in a peel-off action, which allows local users to cause a denial of service (use-after-free and system crash) or possibly have unspecified other impact via crafted system calls.
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2017-15115.json"
[
{
"signature_type": "Line",
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git@df80cd9b28b9ebaa284a41df611dbf3a2d05ca74",
"digest": {
"line_hashes": [
"30347469024873630102987679222244677589",
"263375372593804213597496586222257078578",
"315592291324634564780341485560437480312"
],
"threshold": 0.9
},
"id": "CVE-2017-15115-1a4741fc",
"deprecated": false,
"target": {
"file": "net/sctp/socket.c"
}
},
{
"signature_type": "Function",
"signature_version": "v1",
"source": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git@df80cd9b28b9ebaa284a41df611dbf3a2d05ca74",
"digest": {
"function_hash": "49684741086056691936083650940132558722",
"length": 632.0
},
"id": "CVE-2017-15115-f0914d06",
"deprecated": false,
"target": {
"file": "net/sctp/socket.c",
"function": "sctp_do_peeloff"
}
}
]