The sctp_do_peeloff function in net/sctp/socket.c in the Linux kernel before 4.14 does not check whether the intended netns is used in a peel-off action, which allows local users to cause a denial of service (use-after-free and system crash) or possibly have unspecified other impact via crafted system calls.
- https://usn.ubuntu.com/3581-1/
- https://usn.ubuntu.com/3582-1/
- https://usn.ubuntu.com/3583-2/
No PoCs found on GitHub currently.