{"id":"CVE-2019-19535","details":"In the Linux kernel before 5.2.9, there is an info-leak bug that can be caused by a malicious USB device in the drivers/net/can/usb/peak_usb/pcan_usb_fd.c driver, aka CID-30a8beeb3042.","modified":"2026-03-20T11:28:43.428593Z","published":"2019-12-03T16:15:13.487Z","related":["SUSE-SU-2019:3316-1","SUSE-SU-2019:3379-1","SUSE-SU-2019:3381-1","SUSE-SU-2019:3389-1","SUSE-SU-2020:0093-1","SUSE-SU-2020:0511-1","SUSE-SU-2020:0560-1","SUSE-SU-2020:0584-1","SUSE-SU-2020:0599-1","SUSE-SU-2020:0613-1","SUSE-SU-2020:1255-1","openSUSE-SU-2020:0336-1"],"references":[{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html"},{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2019/12/03/4"},{"type":"ADVISORY","url":"https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.9"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html"},{"type":"FIX","url":"https://www.oracle.com/security-alerts/cpuApr2021.html"},{"type":"FIX","url":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=30a8beeb3042f49d0537b7050fd21b490166a3d9"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git","events":[{"introduced":"0"},{"fixed":"30a8beeb3042f49d0537b7050fd21b490166a3d9"}]},{"type":"GIT","repo":"https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git","events":[{"introduced":"0"},{"fixed":"30a8beeb3042f49d0537b7050fd21b490166a3d9"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2019-19535.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"fixed":"5.2.9"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"15.1"}]},{"events":[{"introduced":"0"},{"last_affected":"8.2"}]},{"events":[{"introduced":"0"},{"fixed":"5.2.9"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}]}