First published: Thu Apr 02 2020(Updated: )
An issue was discovered in slc_bump in drivers/net/can/slcan.c in the Linux kernel 3.16 through 5.6.2. It allows attackers to read uninitialized can_frame data, potentially containing sensitive information from kernel stack memory, if the configuration lacks CONFIG_INIT_STACK_ALL, aka CID-b9258a2cece4.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.13-1 | |
Linux Kernel | >=3.16<=5.6.2 | |
openSUSE | =15.1 | |
Debian | =8.0 | |
Debian | =9.0 | |
Ubuntu | =14.04 | |
Ubuntu | =16.04 | |
Ubuntu | =18.04 | |
Ubuntu | =19.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-11494 is considered a security vulnerability that could potentially expose sensitive information.
To fix CVE-2020-11494, update the Linux kernel to a version newer than 5.6.2 or apply the recommended patches.
CVE-2020-11494 affects Linux kernel versions from 3.16 to 5.6.2, impacting distributions such as openSUSE, Debian, and Ubuntu.
Yes, CVE-2020-11494 allows attackers to read uninitialized can_frame data, which may contain sensitive information.
CVE-2020-11494 is related to the lack of CONFIG_INIT_STACK_ALL in the kernel configuration.