Vulnerability Description
In the Linux Kernel before versions 4.20.8 and 4.19.21 a use-after-free error in the "sctp_sendmsg()" function (net/sctp/socket.c) when handling SCTP_SENDALL flag can be exploited to corrupt memory.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Linux | Linux Kernel | >= 4.17, < 4.19.21 |
| Canonical | Ubuntu Linux | 18.04 |
Related Weaknesses (CWE)
References
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.21Release NotesVendor Advisory
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.20.8Release NotesVendor Advisory
- https://git.kernel.org/cgit/linux/kernel/git/stable/linux-stable.git/commit/?id=Mailing ListPatchVendor Advisory
- https://secuniaresearch.flexerasoftware.com/secunia_research/2019-5/Broken Link
- https://support.f5.com/csp/article/K12671141Third Party Advisory
- https://usn.ubuntu.com/3930-1/Third Party Advisory
- https://usn.ubuntu.com/3930-2/Third Party Advisory
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.21Release NotesVendor Advisory
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.20.8Release NotesVendor Advisory
- https://git.kernel.org/cgit/linux/kernel/git/stable/linux-stable.git/commit/?id=Mailing ListPatchVendor Advisory
- https://secuniaresearch.flexerasoftware.com/secunia_research/2019-5/Broken Link
- https://support.f5.com/csp/article/K12671141Third Party Advisory
- https://usn.ubuntu.com/3930-1/Third Party Advisory
- https://usn.ubuntu.com/3930-2/Third Party Advisory
FAQ
What is CVE-2019-8956?
CVE-2019-8956 is a vulnerability with a CVSS score of 7.8 (HIGH). In the Linux Kernel before versions 4.20.8 and 4.19.21 a use-after-free error in the "sctp_sendmsg()" function (net/sctp/socket.c) when handling SCTP_SENDALL flag can be exploited to corrupt memory.
How severe is CVE-2019-8956?
CVE-2019-8956 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-8956?
Check the references section above for vendor advisories and patch information. Affected products include: Linux Linux Kernel, Canonical Ubuntu Linux.