[PATCH 0/1][SRU][C/D] CVE-2019-8956 - SCTP use-after-free

Colin Ian King colin.king at canonical.com
Fri Feb 22 11:18:57 UTC 2019


On 22/02/2019 11:16, Tyler Hicks wrote:
> On 2019-02-22 10:40:50, Colin Ian King wrote:
>> On 22/02/2019 10:28, Tyler Hicks wrote:
>>> https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-8956.html
>>
>> The URL seems to point to a non-existent page.
> 
> It is due to an unfortunate, but useful, race condition between myself
> and the security team. The security team periodically monitors (sometimes,
> multiple times per day) for Ubuntu CVE Tracker changes proposed by the
> kernel team, double checks them for accuracy, and merges them. Once they
> merge my changes, the page at the above URL will be populated. It just
> so happens that I got this particular kernel patch out the door before
> they merged my Ubuntu CVE Tracker changes.
> 
> I'll paste in the top portion of the CVE file from my pending Ubuntu CVE
> Tracker changes:
> 
> =====
> Candidate: CVE-2019-8956
> PublicDate: 2019-02-22
> References:
>  https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8956
> Description:
>  Secunia Research has discovered a vulnerability in Linux Kernel, which
>  can be exploited by malicious, local users to potentially gain
>  escalated privileges.
> 
>  A use-after-free error in the "sctp_sendmsg()" function
>  (net/sctp/socket.c) when handling SCTP_SENDALL flag can be exploited
>  to corrupt memory.
> 
>  The vulnerability is confirmed in version 4.20.0-rc2 and reported
>  in versions 4.20.x prior to 4.20.8 and 4.19.x prior to 4.19.21.
> Ubuntu-Description:
> Notes:
> Bugs:
> Priority: medium
> Discovered-by: Jakub Jirasek
> Assigned-to:
> 
> Patches_linux:
>  break-fix: 4910280503f3af2857d5aa77e35b22d93a8960a8 ba59fb0273076637f0add4311faa990a5eec27c0
> upstream_linux: released (5.0~rc6)
> precise/esm_linux: not-affected (3.0.0-12.20)
> trusty_linux: not-affected (3.11.0-12.19)
> xenial_linux: not-affected (4.2.0-16.19)
> bionic_linux: not-affected (4.13.0-16.19)
> cosmic_linux: needed
> devel_linux: needed
> =====

Thanks :-)
> 
> Tyler
> 
>>
>>>
>>>  Secunia Research has discovered a vulnerability in Linux Kernel, which
>>>  can be exploited by malicious, local users to potentially gain
>>>  escalated privileges.
>>>
>>>  A use-after-free error in the "sctp_sendmsg()" function
>>>  (net/sctp/socket.c) when handling SCTP_SENDALL flag can be exploited
>>>  to corrupt memory.
>>>
>>> Clean cherry pick back to Cosmic (older releases are not affected).
>>> Build logs are clean.
>>>
>>> Tyler
>>>
>>> Greg Kroah-Hartman (1):
>>>   sctp: walk the list of asoc safely
>>>
>>>  net/sctp/socket.c | 4 ++--
>>>  1 file changed, 2 insertions(+), 2 deletions(-)
>>>
>>
>>
>> -- 
>> kernel-team mailing list
>> kernel-team at lists.ubuntu.com
>> https://lists.ubuntu.com/mailman/listinfo/kernel-team
> 




More information about the kernel-team mailing list