First published: Mon Apr 01 2019(Updated: )
In the Linux Kernel before versions 4.20.8 and 4.19.21 a use-after-free error in the "sctp_sendmsg()" function (net/sctp/socket.c) when handling SCTP_SENDALL flag can be exploited to corrupt memory.
Credit: PSIRT-CNA@flexerasoftware.com PSIRT-CNA@flexerasoftware.com PSIRT-CNA@flexerasoftware.com
Affected Software | Affected Version | How to fix |
---|---|---|
Linux Kernel | >=4.17<4.19.21 | |
Linux Kernel | >=4.20<4.20.8 | |
Ubuntu Linux | =18.04 | |
Ubuntu Linux | =18.10 | |
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.15-1 | |
Ubuntu | =18.04 | |
Ubuntu | =18.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-8956 is a vulnerability in the Linux Kernel that allows for a use-after-free error in the "sctp_sendmsg()" function when handling SCTP_SENDALL flag, which can be exploited to corrupt memory.
The severity of CVE-2019-8956 is not provided.
Details on how to exploit CVE-2019-8956 are not provided.
To fix CVE-2019-8956, update your Linux Kernel to versions 4.20.8 or 4.19.21.
You can find more information about CVE-2019-8956 at the following references: [1] [2] [3]