Bug 1788039 (CVE-2019-19947) - CVE-2019-19947 kernel: uninitialized memory allocation in drivers/net/can/usb/kvaser_usb/kvaser_usb_leaf.c leading to information leak
Summary: CVE-2019-19947 kernel: uninitialized memory allocation in drivers/net/can/usb...
Keywords:
Status: CLOSED NOTABUG
Alias: CVE-2019-19947
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1788040
Blocks: 1788041
TreeView+ depends on / blocked
 
Reported: 2020-01-06 08:39 UTC by Marian Rehak
Modified: 2020-02-03 08:38 UTC (History)
47 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in the Linux kernel in versions through 5.4.6, containing information leaks of uninitialized memory to a USB device. The latest findings show that the uninitialized memory allocation was not leading to an information leak, but was allocating the memory assigned with data on the next line and hence causing no violation.
Clone Of:
Environment:
Last Closed: 2020-01-23 14:09:31 UTC


Attachments (Terms of Use)

Description Marian Rehak 2020-01-06 08:39:45 UTC
In the Linux kernel through 5.4.6, there are information leaks of uninitialized memory to a USB device in the drivers/net/can/usb/kvaser_usb/kvaser_usb_leaf.c driver, aka CID-da2311a6385c.

Comment 1 Marian Rehak 2020-01-06 08:41:10 UTC
Created kernel tracking bugs for this issue:

Affects: fedora-all [bug 1788040]

Comment 2 Marian Rehak 2020-01-06 08:41:44 UTC
External References:

https://www.openwall.com/lists/oss-security/2019/12/24/1

Comment 4 Justin M. Forbes 2020-01-07 17:23:13 UTC
This was fixed for Fedora with the 5.4.7 stable kernel updates.

Comment 5 Product Security DevOps Team 2020-01-23 14:09:31 UTC
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s):

https://access.redhat.com/security/cve/cve-2019-19947

Comment 12 Rohit Keshri 2020-02-03 08:38:41 UTC
Mitigation:

Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.


Note You need to log in before you can comment on or make changes to this bug.