An issue was discovered in the Linux kernel before 4.19.3. crypto_report_one() and related functions in crypto/crypto_user.c (the crypto user configuration API) do not fully initialize structures that are copied to userspace, potentially leaking sensitive memory to user programs. NOTE: this is a CVE-2013-2547 regression but with easier exploitability because the attacker does not need a capability (however, the system must have the CONFIG_CRYPTO_USER kconfig option).
References
Link | Resource |
---|---|
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f43f39958beb206b53292801e216d9b8a660f087 | Patch Vendor Advisory |
https://access.redhat.com/errata/RHSA-2019:3309 | |
https://access.redhat.com/errata/RHSA-2019:3517 | |
https://github.com/torvalds/linux/commit/f43f39958beb206b53292801e216d9b8a660f087 | Patch Third Party Advisory |
https://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.3 | Vendor Advisory |
https://usn.ubuntu.com/3872-1/ | Third Party Advisory |
https://usn.ubuntu.com/3878-1/ | Third Party Advisory |
https://usn.ubuntu.com/3878-2/ | Third Party Advisory |
https://usn.ubuntu.com/3901-1/ | Third Party Advisory |
https://usn.ubuntu.com/3901-2/ | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
No history.
Information
Published : 2018-12-04 16:29
Updated : 2024-02-04 20:03
NVD link : CVE-2018-19854
Mitre link : CVE-2018-19854
CVE.ORG link : CVE-2018-19854
JSON object : View
Products Affected
canonical
- ubuntu_linux
linux
- linux_kernel
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor