Use-after-free vulnerability in the sctp_assoc_update function in net/sctp/associola.c in the Linux kernel before 3.18.8 allows remote attackers to cause a denial of service (slab corruption and panic) or possibly have unspecified other impact by triggering an INIT collision that leads to improper handling of shared-key data.
Advisories
Source ID Title
Debian DLA Debian DLA DLA-155-1 linux-2.6 security update
Debian DSA Debian DSA DSA-3170-1 linux security update
Ubuntu USN Ubuntu USN USN-2541-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-2542-1 Linux kernel (OMAP4) vulnerabilities
Ubuntu USN Ubuntu USN USN-2545-1 Linux kernel (Utopic HWE) vulnerabilities
Ubuntu USN Ubuntu USN USN-2546-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-2562-1 Linux kernel (Trusty HWE) vulnerabilities
Ubuntu USN Ubuntu USN USN-2563-1 Linux kernel vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-06T04:40:18.578Z

Reserved: 2015-01-29T00:00:00

Link: CVE-2015-1421

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2015-03-16T10:59:06.880

Modified: 2025-04-12T10:46:40.837

Link: CVE-2015-1421

cve-icon Redhat

Severity : Important

Publid Date: 2015-01-22T00:00:00Z

Links: CVE-2015-1421 - Bugzilla

cve-icon OpenCVE Enrichment

No data.