Bug 1513345 (CVE-2017-15115) - CVE-2017-15115 kernel: use-after-free in sctp_cmp_addr_exact
Summary: CVE-2017-15115 kernel: use-after-free in sctp_cmp_addr_exact
Keywords:
Status: CLOSED NEXTRELEASE
Alias: CVE-2017-15115
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1499628 1513346
Blocks: 1502813
TreeView+ depends on / blocked
 
Reported: 2017-11-15 09:21 UTC by Vladis Dronov
Modified: 2021-02-17 01:14 UTC (History)
33 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
A vulnerability was found in the Linux kernel when peeling off an association to the socket in another network namespace. All transports in this association are not to be rehashed and keep using the old key in hashtable, thus removing transports from hashtable when closing the socket, all transports are being freed. Later on a use-after-free issue could be caused when looking up an association and dereferencing the transports.
Clone Of:
Environment:
Last Closed: 2017-11-15 11:14:12 UTC
Embargoed:


Attachments (Terms of Use)

Description Vladis Dronov 2017-11-15 09:21:35 UTC
It was found that in Linux kernel when peeling off an association to the socket in another network namespace, all transports in this association are not to be rehashed and keep use the old key in hashtable. A kernel would miss removing transports from hashtable when closing the socket and all transports are being freed. Later on a use-after-free issue could be caused when looking up an association and dereferencing the transports.

References:

https://patchwork.ozlabs.org/patch/827077/

http://seclists.org/oss-sec/2017/q4/282

An upstream patch:

https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=df80cd9b28b9ebaa284a41df611dbf3a2d05ca74

Comment 1 Vladis Dronov 2017-11-15 09:21:57 UTC
Acknowledgments:

Name: ChunYu Wang (Red Hat)

Comment 2 Vladis Dronov 2017-11-15 09:22:58 UTC
Created kernel tracking bugs for this issue:

Affects: fedora-all [bug 1513346]

Comment 3 Vladis Dronov 2017-11-15 09:53:54 UTC
Statement:

This issue does not affect the Linux kernel packages as shipped with Red Hat Enterprise Linux 5 and 6 as a code with the flaw is not present in the products listed.

This issue affects the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 7 and Red Hat Enterprise MRG 2. This has been rated as having Low security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.


Note You need to log in before you can comment on or make changes to this bug.