In the Linux Kernel before versions 4.20.8 and 4.19.21 a use-after-free error in the "sctp_sendmsg()" function (net/sctp/socket.c) when handling SCTP_SENDALL flag can be exploited to corrupt memory.
No PoCs from references.
- https://github.com/0xT11/CVE-POC
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Michael23Yu/POC
- https://github.com/bsauce/kernel-exploit-factory
- https://github.com/bsauce/kernel-security-learning
- https://github.com/butterflyhack/CVE-2019-8956
- https://github.com/developer3000S/PoC-in-GitHub
- https://github.com/exube/sctp_uaf
- https://github.com/hectorgie/PoC-in-GitHub
- https://github.com/now4yreal/linux-kernel-vulnerabilities
- https://github.com/now4yreal/linux-kernel-vulnerabilities-root-cause-analysis
- https://github.com/now4yreal/linux_pwn