The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Vulnerability of usersctp: use after free via sctp_process_a_data_chunk

Synthesis of the vulnerability 

An attacker can force the usage of a freed memory area via sctp_process_a_data_chunk() of usersctp, in order to trigger a denial of service, and possibly to run code.
Impacted systems: iOS by Apple, iPhone, Debian, Fedora, Chrome, Edge Chromium, Firefox, openSUSE Leap, Opera, Solaris, RHEL, SUSE Linux Enterprise Desktop, SLES, Ubuntu.
Severity of this alert: 2/4.
Creation date: 20/10/2020.
Références of this alert: ADV200002, CVE-2020-15969, DLA-2411-1, DLA-2416-1, DSA-4778-1, DSA-4780-1, DSA-4824-1, FEDORA-2020-127d40f1ab, FEDORA-2020-4e8e48da22, FEDORA-2020-8aca25b5c8, FEDORA-2020-aba1d14e9e, HT212003, MFSA2020-45, MFSA2020-46, openSUSE-SU-2020:1705-1, openSUSE-SU-2020:1715-1, openSUSE-SU-2020:1731-1, openSUSE-SU-2020:1732-1, openSUSE-SU-2020:1748-1, openSUSE-SU-2020:1780-1, openSUSE-SU-2020:1785-1, openSUSE-SU-2020:1829-1, RHSA-2020:4235-01, RHSA-2020:4310-01, RHSA-2020:4311-01, RHSA-2020:4315-01, RHSA-2020:4317-01, RHSA-2020:4330-01, RHSA-2020:4909-01, RHSA-2020:4913-01, RHSA-2020:4944-01, RHSA-2020:4945-01, RHSA-2020:4947-01, RHSA-2020:4948-01, SUSE-SU-2020:14522-1, SUSE-SU-2020:3021-1, SUSE-SU-2020:3022-1, SUSE-SU-2020:3053-1, SUSE-SU-2020:3091-1, USN-4599-1, USN-4599-2, USN-4599-3, USN-4647-1, VIGILANCE-VUL-33635.

Description of the vulnerability 

An attacker can force the usage of a freed memory area via sctp_process_a_data_chunk() of usersctp, in order to trigger a denial of service, and possibly to run code.
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

This vulnerability announce impacts software or systems such as iOS by Apple, iPhone, Debian, Fedora, Chrome, Edge Chromium, Firefox, openSUSE Leap, Opera, Solaris, RHEL, SUSE Linux Enterprise Desktop, SLES, Ubuntu.

Our Vigil@nce team determined that the severity of this cybersecurity threat is medium.

The trust level is of type confirmed by the editor, with an origin of document.

An attacker with a expert ability can exploit this computer threat bulletin.

Solutions for this threat 

Chrome: version 86.0.4240.75.
The version 86.0.4240.75 is fixed:
  https://www.google.fr/chrome/

Apple iOS: version 14.3.
The version 14.3 is fixed:
  https://support.apple.com/

Debian 10: new chromium packages.
New packages are available:
  Debian 10: chromium 87.0.4280.88-0.4~deb10u1

Debian 10: new firefox-esr packages.
New packages are available:
  Debian 10: firefox-esr 78.4.0esr-1~deb10u2

Debian 10: new thunderbird packages.
New packages are available:
  Debian 10: thunderbird 1:78.4.0-1~deb10u1

Debian 9: new firefox-esr packages.
New packages are available:
  Debian 9: firefox-esr 78.4.0esr-1~deb9u1

Debian 9: new thunderbird packages.
New packages are available:
  Debian 9: thunderbird 1:78.4.0-1~deb9u1

Fedora 31: new chromium packages.
New packages are available:
  Fedora 31: chromium 86.0.4240.111-1.fc31

Fedora 32: new chromium packages.
New packages are available:
  Fedora 32: chromium 86.0.4240.111-1.fc32

Fedora 32: new firefox packages.
New packages are available:
  Fedora 32: firefox 82.0-4.fc32

Fedora 33: new chromium packages.
New packages are available:
  Fedora 33: chromium 86.0.4240.183-1.fc33

Microsoft Edge Chromium: version 86.0.622.38.
The version 86.0.622.38 is fixed:
  https://portal.msrc.microsoft.com/en-us/security-guidance/advisory/ADV200002

Mozilla Firefox: version 78.4.
The version 78.4 is fixed:
  https://www.mozilla.org/en-US/firefox/

Mozilla Firefox: version 82.
The version 82 is fixed:
  https://www.mozilla.org/en-US/firefox/

openSUSE Leap 15.1: new MozillaFirefox packages.
New packages are available:
  openSUSE Leap 15.1: MozillaFirefox 78.4.0-lp151.2.73.1

openSUSE Leap 15.2: new MozillaFirefox packages.
New packages are available:
  openSUSE Leap 15.2: MozillaFirefox 78.4.0-lp152.2.24.1

openSUSE Leap 15: new chromium packages.
New packages are available:
  openSUSE Leap 15.1: chromium 86.0.4240.75-lp151.2.144.1
  openSUSE Leap 15.2: chromium 86.0.4240.75-lp152.2.39.1

openSUSE Leap 15: new MozillaThunderbird packages.
New packages are available:
  openSUSE Leap 15.1: MozillaThunderbird 78.4.0-lp151.2.53.1
  openSUSE Leap 15.2: MozillaThunderbird 78.4.0-lp152.2.13.1

Oracle Solaris: patch for third party software of October 2020 v3.
A patch is available:
  https://support.oracle.com/rs?type=doc&id=1448883.1

RHEL 6.10: new chromium-browser packages.
New packages are available:
  RHEL 6.10: chromium-browser 86.0.4240.75-1.el6_10

RHEL 6.10: new firefox packages.
New packages are available:
  RHEL 6.10: firefox 78.4.0-2.el6_10

RHEL 6.10: new thunderbird packages.
New packages are available:
  RHEL 6.10: thunderbird 78.4.0-1.el6_10

RHEL 7.9: new firefox packages.
New packages are available:
  RHEL 7.9: firefox 78.4.0-1.el7_9

RHEL 7.9: new thunderbird packages.
New packages are available:
  RHEL 7.9: thunderbird 78.4.0-1.el7_9

RHEL 8.0: new firefox packages.
New packages are available:
  RHEL 8.0: firefox 78.4.0-1.el8_0

RHEL 8.1: new firefox packages.
New packages are available:
  RHEL 8.1: firefox 78.4.0-1.el8_1

RHEL 8.2: new firefox packages.
New packages are available:
  RHEL 8.2: firefox 78.4.0-1.el8_2

RHEL 8.3: new thunderbird packages.
New packages are available:
  RHEL 8.3: thunderbird 78.4.0-1.el8_3

RHEL 8: new thunderbird packages.
New packages are available:
  RHEL 8.0: thunderbird 78.4.0-1.el8_0
  RHEL 8.1: thunderbird 78.4.0-1.el8_1
  RHEL 8.2: thunderbird 78.4.0-1.el8_2

SUSE LE 11 SP4: new MozillaFirefox packages.
New packages are available:
  SUSE LE 11 SP4: MozillaFirefox 78.4.0-78.99.1

SUSE LE 12: new MozillaFirefox packages.
New packages are available:
  SUSE LE 12 SP2: MozillaFirefox 78.4.0-112.28.1
  SUSE LE 12 SP3: MozillaFirefox 78.4.0-112.28.1
  SUSE LE 12 SP4: MozillaFirefox 78.4.0-112.28.1
  SUSE LE 12 SP5: MozillaFirefox 78.4.0-112.28.1

SUSE LE 15 SP1-2: new MozillaThunderbird packages.
New packages are available:
  SUSE LE 15 SP1: MozillaThunderbird 78.4.0-3.99.1
  SUSE LE 15 SP2: MozillaThunderbird 78.4.0-3.99.1

SUSE LE 15 SP1: new chromium packages.
New packages are available:
  SUSE LE 15 SP1: chromium 86.0.4240.111-bp151.3.116.1

SUSE LE 15 SP1: new MozillaFirefox packages.
New packages are available:
  SUSE LE 15 SP1: MozillaFirefox 78.4.0-3.113.3

SUSE LE 15 SP2: new chromium packages.
New packages are available:
  SUSE LE 15 SP2: chromium 86.0.4240.183-bp152.2.26.1

SUSE LE 15 SP2: new MozillaFirefox packages.
New packages are available:
  SUSE LE 15 SP2: MozillaFirefox 78.4.0-8.11.2

Ubuntu: new firefox packages.
New packages are available:
  Ubuntu 20.10: firefox 82.0.2+build1-0ubuntu0.20.10.1
  Ubuntu 20.04 LTS: firefox 82.0.2+build1-0ubuntu0.20.04.1
  Ubuntu 18.04 LTS: firefox 82.0.2+build1-0ubuntu0.18.04.1
  Ubuntu 16.04 LTS: firefox 82.0.2+build1-0ubuntu0.16.04.1

Ubuntu: new thunderbird packages.
New packages are available:
  Ubuntu 20.10: thunderbird 1:78.5.0+build3-0ubuntu0.20.10.1
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

Computer vulnerabilities tracking service 

Vigil@nce provides a network vulnerability workaround. The technology watch team tracks security threats targeting the computer system.