CVE-2018-19854
low-risk
Published 2018-12-04
An issue was discovered in the Linux kernel before 4.19.3. crypto_report_one() and related functions in crypto/crypto_user.c (the crypto user configuration API) do not fully initialize structures that are copied to userspace, potentially leaking sensitive memory to user programs. NOTE: this is a CVE-2013-2547 regression but with easier exploitability because the attacker does not need a capability (however, the system must have the CONFIG_CRYPTO_USER kconfig option).
Do I need to act?
-
0.05% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
4
CVSS 4.7/10
Medium
LOCAL
/ HIGH complexity
Affected Products (5)
References (20)
Vendor Advisory
https://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.3
Third Party Advisory
https://usn.ubuntu.com/3872-1/
Third Party Advisory
https://usn.ubuntu.com/3878-1/
Third Party Advisory
https://usn.ubuntu.com/3878-2/
Third Party Advisory
https://usn.ubuntu.com/3901-1/
Third Party Advisory
https://usn.ubuntu.com/3901-2/
Vendor Advisory
https://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.3
Third Party Advisory
https://usn.ubuntu.com/3872-1/
Third Party Advisory
https://usn.ubuntu.com/3878-1/
Third Party Advisory
https://usn.ubuntu.com/3878-2/
Third Party Advisory
https://usn.ubuntu.com/3901-1/
Third Party Advisory
https://usn.ubuntu.com/3901-2/
24
/ 100
low-risk
Severity
12/34 · Low
Exploitability
0/34 · Minimal
Exposure
12/34 · Low