The SCTP socket buffer used by a userspace application is not accounted by the cgroups subsystem. An attacker can use this flaw to cause a denial of service attack. Kernel 3.10.x and 4.18.x branches are believed to be vulnerable.
The product does not properly control the allocation and maintenance of a limited resource.
Link | Tags |
---|---|
https://usn.ubuntu.com/3981-1/ | third party advisory vendor advisory |
https://usn.ubuntu.com/3980-1/ | third party advisory vendor advisory |
https://usn.ubuntu.com/3979-1/ | third party advisory vendor advisory |
https://usn.ubuntu.com/3982-2/ | third party advisory vendor advisory |
https://usn.ubuntu.com/3982-1/ | third party advisory vendor advisory |
https://usn.ubuntu.com/3980-2/ | third party advisory vendor advisory |
https://usn.ubuntu.com/3981-2/ | third party advisory vendor advisory |
https://access.redhat.com/errata/RHSA-2019:3309 | third party advisory vendor advisory |
https://access.redhat.com/errata/RHSA-2019:3517 | third party advisory vendor advisory |
https://lists.debian.org/debian-lts-announce/2020/09/msg00025.html | third party advisory mailing list |
https://www.oracle.com/security-alerts/cpuApr2021.html | |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3874 | issue tracking third party advisory patch |
https://security.netapp.com/advisory/ntap-20190411-0003/ | third party advisory |