Bug 1257528 (CVE-2015-5283) - CVE-2015-5283 kernel: Creating multiple sockets when SCTP module isn't loaded leads to kernel panic
Summary: CVE-2015-5283 kernel: Creating multiple sockets when SCTP module isn't loaded...
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2015-5283
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1251807 1279290
Blocks: 1257532
TreeView+ depends on / blocked
 
Reported: 2015-08-27 09:32 UTC by Adam Mariš
Modified: 2021-06-01 13:01 UTC (History)
26 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
A NULL pointer dereference flaw was found in the SCTP implementation. A local user could use this flaw to cause a denial of service on the system by triggering a kernel panic when creating multiple sockets in parallel while the system did not have the SCTP module loaded.
Clone Of:
Environment:
Last Closed: 2016-09-26 03:49:03 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2015:2152 0 normal SHIPPED_LIVE Important: kernel security, bug fix, and enhancement update 2015-11-20 00:56:02 UTC
Red Hat Product Errata RHSA-2015:2411 0 normal SHIPPED_LIVE Important: kernel-rt security, bug fix, and enhancement update 2015-11-19 11:24:06 UTC

Description Adam Mariš 2015-08-27 09:32:02 UTC
A NULL pointer dereference flaw was found in SCTP implementation allowing the local user to cause system DoS. Creation of multiple sockets in parallel when system doesn't have SCTP module loaded can lead to kernel panic.

Upstream patch:

http://patchwork.ozlabs.org/patch/515996/

Comment 1 Wade Mealing 2015-11-09 03:39:37 UTC
Created kernel tracking bugs for this issue:

Affects: fedora-all [bug 1279290]

Comment 3 Wade Mealing 2015-11-09 03:45:09 UTC
Statement:

This issue affects the Linux kernels as shipped with Red Hat Enterprise Linux 5, 6 and 7. Due to the limited security impact the issue is currently not planned to be addressed in Red Hat Enterprise Linux 5 and 6.

Comment 5 errata-xmlrpc 2015-11-19 13:15:44 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2015:2411 https://rhn.redhat.com/errata/RHSA-2015-2411.html

Comment 6 errata-xmlrpc 2015-11-19 23:11:55 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2015:2152 https://rhn.redhat.com/errata/RHSA-2015-2152.html

Comment 7 errata-xmlrpc 2015-11-19 23:26:43 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2015:2152 https://rhn.redhat.com/errata/RHSA-2015-2152.html


Note You need to log in before you can comment on or make changes to this bug.