CVE Vulnerabilities

CVE-2019-19126

Improper Initialization

Published: Nov 19, 2019 | Modified: Nov 21, 2024
CVSS 3.x
3.3
LOW
Source:
NVD
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
CVSS 2.x
2.1 LOW
AV:L/AC:L/Au:N/C:P/I:N/A:N
RedHat/V2
RedHat/V3
2.9 LOW
CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
Ubuntu
LOW
root.io logo minimus.io logo echo.ai logo

On the x86-64 architecture, the GNU C Library (aka glibc) before 2.31 fails to ignore the LD_PREFER_MAP_32BIT_EXEC environment variable during program execution after a security transition, allowing local attackers to restrict the possible mapping addresses for loaded libraries and thus bypass ASLR for a setuid program.

Weakness

The product does not initialize or incorrectly initializes a resource, which might leave the resource in an unexpected state when it is accessed or used.

Affected Software

NameVendorStart VersionEnd Version
GlibcGnu*2.31 (excluding)
Red Hat Enterprise Linux 7RedHatglibc-0:2.17-317.el7*
Red Hat Enterprise Linux 8RedHatglibc-0:2.28-101.el8*
Red Hat Enterprise Linux 8RedHatglibc-0:2.28-101.el8*
Red Hat OpenShift DoRedHatopenshiftdo/odo-init-image-rhel7:1.1.3-2*
EglibcUbuntutrusty*
GlibcUbuntubionic*
GlibcUbuntudisco*
GlibcUbuntueoan*
GlibcUbuntuesm-infra/bionic*
GlibcUbuntuesm-infra/xenial*
GlibcUbuntutrusty*
GlibcUbuntuupstream*
GlibcUbuntuxenial*

Potential Mitigations

  • Use a language that does not allow this weakness to occur or provides constructs that make this weakness easier to avoid.
  • For example, in Java, if the programmer does not explicitly initialize a variable, then the code could produce a compile-time error (if the variable is local) or automatically initialize the variable to the default value for the variable’s type. In Perl, if explicit initialization is not performed, then a default value of undef is assigned, which is interpreted as 0, false, or an equivalent value depending on the context in which the variable is accessed.

References