Bug 1678685 (CVE-2019-8912) - CVE-2019-8912 kernel: af_alg_release() in crypto/af_alg.c neglects to set a NULL value for a certain structure member, which leads to a use-after-free in sockfs_setattr
Summary: CVE-2019-8912 kernel: af_alg_release() in crypto/af_alg.c neglects to set a N...
Status: NEW
Alias: CVE-2019-8912
Product: Security Response
Classification: Other
Component: vulnerability   
(Show other bugs)
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard: impact=important,public=20190215,repo...
Keywords: Security
Depends On: 1679449 1679450 1679451 1678686 1679452 1679524
Blocks: 1678692
TreeView+ depends on / blocked
 
Reported: 2019-02-19 11:42 UTC by msiddiqu
Modified: 2019-03-18 00:49 UTC (History)
39 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
In the Linux kernel af_alg_release() in crypto/af_alg.c neglects to set a NULL value for a certain structure member, which leads to a use-after-free (UAF) in sockfs_setattr. A local attacker can use this flaw to escalate privileges and take control of the system.
Story Points: ---
Clone Of:
Environment:
Last Closed:
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

Description msiddiqu 2019-02-19 11:42:07 UTC
In the Linux kernel af_alg_release() in crypto/af_alg.c neglects to set a NULL value for a certain structure member, which leads to a use-after-free (UAF) in sockfs_setattr.

A local attacker can use this flaw to escalate privileges and take control of the system.  Other vendors have considered this a 'network' accessible attack, this claim is unsubstantiated at this time. 

Note: The attack vector that allowed the use-after-free mentioned in the original report is not introduced in the Red Hat Enterprise Linux 7, 6 and 5 versions of the kernel.  

References:

http://patchwork.ozlabs.org/patch/1042902/

An upstream patch:

https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9060cb719e61b685ec0102574e10337fa5f445ea

Comment 1 msiddiqu 2019-02-19 11:42:20 UTC
Created kernel tracking bugs for this issue:

Affects: fedora-all [bug 1678686]


Note You need to log in before you can comment on or make changes to this bug.