Bug 1819146 (CVE-2019-9453)

Summary: CVE-2019-9453 kernel: out of bounds read in F2FS touch driver leads to local information disclosure
Product: [Other] Security Response Reporter: msiddiqu
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED NOTABUG QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: acaringi, airlied, allarkin, bhu, blc, brdeoliv, bskeggs, dhoward, dvlasenk, esammons, fhrbata, hdegoede, hkrzesin, iboverma, ichavero, itamar, jarodwilson, jeremy, jforbes, jglisse, jlelli, john.j5live, jonathan, josef, jross, jshortt, jstancek, jwboyer, kernel-maint, kernel-mgr, labbott, lgoncalv, linville, masami256, matt, mchehab, mcressma, mjg59, mlangsdo, nmurray, qzhao, rt-maint, rvrbovsk, steved, williams
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2020-04-08 12:34:17 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1819149    
Bug Blocks: 1750356, 1819151    

Description msiddiqu 2020-03-31 10:24:57 UTC
A vulnerability was found in F2FS touch driver in kernel where there is a possible out of bounds
read due to improper input validation. This could lead to local information
disclosure with system execution privileges needed. User interaction is not
needed for exploitation.

Upstream patch:
https://lore.kernel.org/patchwork/patch/1060480/

References:
https://source.android.com/security/bulletin/pixel/2019-09-01

Comment 1 msiddiqu 2020-03-31 10:25:47 UTC
Created kernel tracking bugs for this issue:

Affects: fedora-all [bug 1819149]

Comment 2 Justin M. Forbes 2020-03-31 13:56:41 UTC
This was fixed for Fedora with the 5.1.12 stable kernel updates.

Comment 3 Alex 2020-04-08 11:36:31 UTC
For F2FS (file system) that is disabled for all rhel* versions,
the configuration param that is disabled:
"# CONFIG_F2FS_FS is not set"