CVE-2019-20503

Name
CVE-2019-20503
Description
usrsctp before 2019-12-20 has out-of-bounds reads in sctp_load_addresses_from_init.
NVD Severity
medium
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
Exploit https://bugs.chromium.org/p/project-zero/issues/detail?id=1992
Patch https://github.com/sctplab/usrsctp/commit/790a7a2555aefb392a5a69923f1e9d17b4968467
MLIST https://lists.debian.org/debian-lts-announce/2020/03/msg00013.html
DEBIAN https://www.debian.org/security/2020/dsa-4639
GENTOO https://security.gentoo.org/glsa/202003-02
GENTOO https://security.gentoo.org/glsa/202003-10
SUSE http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00022.html
REDHAT https://access.redhat.com/errata/RHSA-2020:0815
REDHAT https://access.redhat.com/errata/RHSA-2020:0816
REDHAT https://access.redhat.com/errata/RHSA-2020:0819
REDHAT https://access.redhat.com/errata/RHSA-2020:0820
DEBIAN https://www.debian.org/security/2020/dsa-4645
MISC https://crbug.com/1059349
MISC https://chromereleases.googleblog.com/2020/03/stable-channel-update-for-desktop_18.html
FEDORA https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JWANFIR3PYAL5RJQ4AO3ZS2DYMSF2ZGZ/
SUSE http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00030.html
UBUNTU https://usn.ubuntu.com/4299-1/
DEBIAN https://www.debian.org/security/2020/dsa-4642
MLIST https://lists.debian.org/debian-lts-announce/2020/03/msg00023.html
SUSE http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00028.html
FEDORA https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2DDNOAGIX5D77TTHT6YPMVJ5WTXTCQEI/
FEDORA https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6IOHSO6BUKC6I66J5PZOMAGFVJ66ZS57/
SUSE http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00037.html
UBUNTU https://usn.ubuntu.com/4328-1/
UBUNTU https://usn.ubuntu.com/4335-1/
CONFIRM https://support.apple.com/kb/HT211168
CONFIRM https://support.apple.com/kb/HT211175
CONFIRM https://support.apple.com/kb/HT211171
CONFIRM https://support.apple.com/kb/HT211177
FULLDISC http://seclists.org/fulldisclosure/2020/May/49
FULLDISC http://seclists.org/fulldisclosure/2020/May/52
FULLDISC http://seclists.org/fulldisclosure/2020/May/59
FULLDISC http://seclists.org/fulldisclosure/2020/May/55
MISC https://support.apple.com/HT211177
MISC https://support.apple.com/HT211171
MISC https://support.apple.com/HT211175
MISC https://support.apple.com/HT211168

Match rules

CPE URI Source package Min version Max version
cpe:2.3:a:usrsctp_project:usrsctp:*:*:*:*:*:*:*:* usrsctp >= None < 2019-12-20

Vulnerable and fixed packages

Source package Branch Version Maintainer Status