### [CVE-2017-15115](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-15115) ![](https://img.shields.io/static/v1?label=Product&message=Linux%20kernel%20before%204.14-rc6&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3D%20Linux%20kernel%20before%204.14-rc6%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=local%20crash&color=brighgreen) ### Description The sctp_do_peeloff function in net/sctp/socket.c in the Linux kernel before 4.14 does not check whether the intended netns is used in a peel-off action, which allows local users to cause a denial of service (use-after-free and system crash) or possibly have unspecified other impact via crafted system calls. ### POC #### Reference - https://usn.ubuntu.com/3581-1/ - https://usn.ubuntu.com/3582-1/ - https://usn.ubuntu.com/3583-2/ #### Github No PoCs found on GitHub currently.