CVE-2018-19854

An issue was discovered in the Linux kernel before 4.19.3. crypto_report_one() and related functions in crypto/crypto_user.c (the crypto user configuration API) do not fully initialize structures that are copied to userspace, potentially leaking sensitive memory to user programs. NOTE: this is a CVE-2013-2547 regression but with easier exploitability because the attacker does not need a capability (however, the system must have the CONFIG_CRYPTO_USER kconfig option).
Configurations

Configuration 1 (hide)

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.10:*:*:*:*:*:*:*

History

21 Nov 2024, 03:58

Type Values Removed Values Added
References () http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f43f39958beb206b53292801e216d9b8a660f087 - Patch, Vendor Advisory () http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f43f39958beb206b53292801e216d9b8a660f087 - Patch, Vendor Advisory
References () https://access.redhat.com/errata/RHSA-2019:3309 - () https://access.redhat.com/errata/RHSA-2019:3309 -
References () https://access.redhat.com/errata/RHSA-2019:3517 - () https://access.redhat.com/errata/RHSA-2019:3517 -
References () https://github.com/torvalds/linux/commit/f43f39958beb206b53292801e216d9b8a660f087 - Patch, Third Party Advisory () https://github.com/torvalds/linux/commit/f43f39958beb206b53292801e216d9b8a660f087 - Patch, Third Party Advisory
References () https://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.3 - Vendor Advisory () https://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.3 - Vendor Advisory
References () https://usn.ubuntu.com/3872-1/ - Third Party Advisory () https://usn.ubuntu.com/3872-1/ - Third Party Advisory
References () https://usn.ubuntu.com/3878-1/ - Third Party Advisory () https://usn.ubuntu.com/3878-1/ - Third Party Advisory
References () https://usn.ubuntu.com/3878-2/ - Third Party Advisory () https://usn.ubuntu.com/3878-2/ - Third Party Advisory
References () https://usn.ubuntu.com/3901-1/ - Third Party Advisory () https://usn.ubuntu.com/3901-1/ - Third Party Advisory
References () https://usn.ubuntu.com/3901-2/ - Third Party Advisory () https://usn.ubuntu.com/3901-2/ - Third Party Advisory

Information

Published : 2018-12-04 16:29

Updated : 2024-11-21 03:58


NVD link : CVE-2018-19854

Mitre link : CVE-2018-19854

CVE.ORG link : CVE-2018-19854


JSON object : View

Products Affected

canonical

  • ubuntu_linux

linux

  • linux_kernel
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor