Description
In the Linux Kernel before versions 4.20.8 and 4.19.21 a use-after-free error in the "sctp_sendmsg()" function (net/sctp/socket.c) when handling SCTP_SENDALL flag can be exploited to corrupt memory.
Exploits (1)
References (7)
Core 7
Core References
Release Notes, Vendor Advisory x_refsource_misc
https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.21
Release Notes, Vendor Advisory x_refsource_misc
https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.20.8
Broken Link x_refsource_misc
https://secuniaresearch.flexerasoftware.com/secunia_research/2019-5/
Mailing List, Patch, Vendor Advisory x_refsource_misc
https://git.kernel.org/cgit/linux/kernel/git/stable/linux-stable.git/commit/?id=ba59fb0273076637f0add4311faa990a5eec27c0
Third Party Advisory vendor-advisory
x_refsource_ubuntu
https://usn.ubuntu.com/3930-1/
Third Party Advisory vendor-advisory
x_refsource_ubuntu
https://usn.ubuntu.com/3930-2/
Third Party Advisory x_refsource_confirm
https://support.f5.com/csp/article/K12671141
Scores
CVSS v3
7.8
EPSS
0.0102
EPSS Percentile
77.4%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-416
CWE-787
Status
published
Products (3)
canonical/ubuntu_linux
18.04
canonical/ubuntu_linux
18.10
linux/linux_kernel
4.17 - 4.19.21
Published
Apr 01, 2019
Tracked Since
Feb 18, 2026