Bug 1786078 (CVE-2019-19807) - CVE-2019-19807 kernel: use-after-free in sound/core/timer.c
Summary: CVE-2019-19807 kernel: use-after-free in sound/core/timer.c
Keywords:
Status: NEW
Alias: CVE-2019-19807
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1798457 1798459 1798467 1798468 1798469 1798470 1786080 1795892 1795893 1795894 1795895 1798476
Blocks: 1786081
TreeView+ depends on / blocked
 
Reported: 2019-12-23 10:48 UTC by msiddiqu
Modified: 2020-02-20 06:22 UTC (History)
52 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
A vulnerability was found in snd_timer_open in sound/core/timer.c in ALSA subsystem, here the timer instance 'struct snd_timer_instance' is stored incorrectly and passed to the caller (snd_timer_user_tselect()) even if (timer->num_instances >= timer->max_instances) fails and returns an error, this may eventually lead to a use-after-free problem.
Clone Of:
Environment:
Last Closed:


Attachments (Terms of Use)

Description msiddiqu 2019-12-23 10:48:50 UTC
In the Linux kernel, sound/core/timer.c has a use-after-free caused by erroneous code refactoring. This is related to snd_timer_open and snd_timer_close_locked. The timeri variable was originally intended to be for a newly created timer instance, but was used for a different purpose after refactoring.

References: 

https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.11

Upstream Patch:

https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e7af6307a8a54f0b873960b32b6a644f2d0fbd97https://github.com/torvalds/linux/commit/e7af6307a8a54f0b873960b32b6a644f2d0fbd97

Comment 1 msiddiqu 2019-12-23 10:49:28 UTC
Created kernel tracking bugs for this issue:

Affects: fedora-all [bug 1786080]

Comment 2 Justin M. Forbes 2019-12-23 15:19:57 UTC
This was fixed for Fedora with the 5.3.11 stable kernel updates.

Comment 5 Rohit Keshri 2020-01-29 07:26:52 UTC
Mitigation:

Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.


Note You need to log in before you can comment on or make changes to this bug.