Bug 1134198 - (CVE-2018-20509) VUL-0: CVE-2018-20509: kernel-source: The print_binder_ref_olocked function in drivers/android/binder.c in the Linux kernel 4.14.90 allows local users to obtain sensitive address information by reading " ref *desc *node" lines in a debugfs
(CVE-2018-20509)
VUL-0: CVE-2018-20509: kernel-source: The print_binder_ref_olocked function i...
Status: RESOLVED UPSTREAM
Classification: Novell Products
Product: SUSE Security Incidents
Classification: Novell Products
Component: Incidents
unspecified
Other Other
: P5 - None : Normal
: ---
Assigned To: E-mail List
Security Team bot
https://smash.suse.de/issue/231849/
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2019-05-06 12:35 UTC by Marcus Meissner
Modified: 2019-05-06 12:35 UTC (History)
1 user (show)

See Also:
Found By: Security Response Team
Services Priority:
Business Priority:
Blocker: ---
Marketing QA Status: ---
IT Deployment: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Marcus Meissner 2019-05-06 12:35:01 UTC
CVE-2018-20509

The print_binder_ref_olocked function in drivers/android/binder.c in the Linux
kernel 4.14.90 allows local users to obtain sensitive address information by
reading " ref *desc *node" lines in a debugfs file.

References:
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-20509
http://people.canonical.com/~ubuntu-security/cve/2018/CVE-2018-20509.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20509
https://github.com/Yellow-Pay/CVE/blob/master/CVE-2018-20509.md
https://www.mail-archive.com/debian-security-tracker@lists.debian.org/msg03902.html
Comment 1 Marcus Meissner 2019-05-06 12:35:17 UTC
we do not build ANDROID kernels