CVE-2015-3212

CVSS V2 Medium 4.9 CVSS V3 None
Description
Race condition in net/sctp/socket.c in the Linux kernel before 4.1.2 allows local users to cause a denial of service (list corruption and panic) via a rapid series of system calls related to sockets, as demonstrated by setsockopt calls.
Overview
  • CVE ID
  • CVE-2015-3212
  • Assigner
  • secalert@redhat.com
  • Vulnerability Status
  • Modified
  • Published Version
  • 2015-08-31T10:59:06
  • Last Modified Date
  • 2023-02-13T00:48:11
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:* 1 OR 4.1.1
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:L/AC:L/Au:N/C:N/I:N/A:C
  • Access Vector
  • LOCAL
  • Access Compatibility
  • LOW
  • Authentication
  • NONE
  • Confidentiality Impact
  • NONE
  • Integrity Impact
  • NONE
  • Availability Impact
  • COMPLETE
  • Base Score
  • 4.9
  • Severity
  • MEDIUM
  • Exploitability Score
  • 3.9
  • Impact Score
  • 6.9
History
Created Old Value New Value Data Type Notes
2022-05-10 17:44:12 Added to TrackCVE
2022-12-02 06:10:43 2015-08-31T10:59Z 2015-08-31T10:59:06 CVE Published Date updated
2022-12-02 06:10:43 2019-04-08T20:29:06 CVE Modified Date updated
2022-12-02 06:10:43 Modified Vulnerability Status updated
2023-02-02 21:05:06 2023-02-02T20:20:23 CVE Modified Date updated
2023-02-02 21:05:07 Race condition in net/sctp/socket.c in the Linux kernel before 4.1.2 allows local users to cause a denial of service (list corruption and panic) via a rapid series of system calls related to sockets, as demonstrated by setsockopt calls. A race condition flaw was found in the way the Linux kernel's SCTP implementation handled Address Configuration lists when performing Address Configuration Change (ASCONF). A local attacker could use this flaw to crash the system via a race condition triggered by setting certain ASCONF options on a socket. Description updated
2023-02-02 21:05:14 References updated
2023-02-13 01:06:05 2023-02-13T00:48:11 CVE Modified Date updated
2023-02-13 01:06:06 A race condition flaw was found in the way the Linux kernel's SCTP implementation handled Address Configuration lists when performing Address Configuration Change (ASCONF). A local attacker could use this flaw to crash the system via a race condition triggered by setting certain ASCONF options on a socket. Race condition in net/sctp/socket.c in the Linux kernel before 4.1.2 allows local users to cause a denial of service (list corruption and panic) via a rapid series of system calls related to sockets, as demonstrated by setsockopt calls. Description updated