SB2021060736 - Privilege escalation in Linux kernel sctp
Published: June 7, 2021 Updated: November 22, 2023
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Use-after-free (CVE-ID: CVE-2018-25015)
The vulnerability allows a local authenticated user to escalate privileges on the system.
The vulnerability exists due to a use-after-free error within the net/sctp/socket.c. A local authenticated user can trigger a use-after-free error and escalate privileges on the system.
Remediation
Install update from vendor's website.
References
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a0ff660058b88d12625a783ce9e5c1371c87951f
- https://syzkaller.appspot.com/bug?id=a8d38d1b68ffc744c53bd9b9fc1dbd6c86b1afe2
- https://sites.google.com/view/syzscope/warning-held-lock-freed
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.16
- https://security.netapp.com/advisory/ntap-20210720-0002/