CVE-2019-3460
kernel: Heap address information leak while using L2CAP_PARSE_CONF_RSP
Severity Score
6.5
*CVSS v3.1
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
1
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
A heap data infoleak in multiple locations including L2CAP_PARSE_CONF_RSP was found in the Linux kernel before 5.1-rc1.
Se ha descubierto una fuga de información en múltiples ubicaciones en memoria dinámica, incluyendo L2CAP_GET_CONF_OPT en el kernel de Linux anterior a 5.1-rc1.
A flaw was found in the Linux kernel's implementation of logical link control and adaptation protocol (L2CAP), part of the Bluetooth stack in the l2cap_parse_conf_rsp and l2cap_parse_conf_req functions. An attacker with physical access within the range of standard Bluetooth transmission can create a specially crafted packet. The response to this specially crafted packet can contain part of the kernel stack which can be used in a further attack.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2018-12-31 CVE Reserved
- 2019-04-03 CVE Published
- 2024-08-04 CVE Updated
- 2024-08-04 First Exploit
- 2024-10-11 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-20: Improper Input Validation
- CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CAPEC
References (19)
URL | Tag | Source |
---|---|---|
http://www.openwall.com/lists/oss-security/2019/06/27/2 | Mailing List | |
http://www.openwall.com/lists/oss-security/2019/06/27/7 | Mailing List | |
http://www.openwall.com/lists/oss-security/2019/06/28/1 | Mailing List | |
http://www.openwall.com/lists/oss-security/2019/06/28/2 | Mailing List | |
http://www.openwall.com/lists/oss-security/2019/08/12/1 | Mailing List | |
https://lists.debian.org/debian-lts-announce/2019/05/msg00002.html | Mailing List | |
https://lists.debian.org/debian-lts-announce/2019/05/msg00041.html | Mailing List | |
https://lists.debian.org/debian-lts-announce/2019/05/msg00042.html | Mailing List | |
https://lore.kernel.org/linux-bluetooth/20190110062917.GB15047%40kroah.com | Mailing List | |
https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-3460.html | Third Party Advisory |
URL | Date | SRC |
---|---|---|
https://marc.info/?l=oss-security&m=154721580222522&w=2 | 2024-08-04 |
URL | Date | SRC |
---|---|---|
https://git.kernel.org/linus/af3d5d1c87664a4f150fcf3534c6567cb19909b0 | 2023-11-07 |
URL | Date | SRC |
---|---|---|
https://access.redhat.com/errata/RHSA-2019:2029 | 2023-11-07 | |
https://access.redhat.com/errata/RHSA-2019:2043 | 2023-11-07 | |
https://access.redhat.com/errata/RHSA-2019:3309 | 2023-11-07 | |
https://access.redhat.com/errata/RHSA-2019:3517 | 2023-11-07 | |
https://access.redhat.com/errata/RHSA-2020:0740 | 2023-11-07 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1663179 | 2020-03-09 | |
https://access.redhat.com/security/cve/CVE-2019-3460 | 2020-03-09 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | <= 5.1 Search vendor "Linux" for product "Linux Kernel" and version " <= 5.1" | - |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 14.04 Search vendor "Canonical" for product "Ubuntu Linux" and version "14.04" | lts |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 16.04 Search vendor "Canonical" for product "Ubuntu Linux" and version "16.04" | lts |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 18.04 Search vendor "Canonical" for product "Ubuntu Linux" and version "18.04" | lts |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 18.10 Search vendor "Canonical" for product "Ubuntu Linux" and version "18.10" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 8.0 Search vendor "Debian" for product "Debian Linux" and version "8.0" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Codeready Linux Builder Search vendor "Redhat" for product "Codeready Linux Builder" | 8.0 Search vendor "Redhat" for product "Codeready Linux Builder" and version "8.0" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Virtualization Host Search vendor "Redhat" for product "Virtualization Host" | 4.0 Search vendor "Redhat" for product "Virtualization Host" and version "4.0" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Enterprise Linux Search vendor "Redhat" for product "Enterprise Linux" | 8.0 Search vendor "Redhat" for product "Enterprise Linux" and version "8.0" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Enterprise Linux Desktop Search vendor "Redhat" for product "Enterprise Linux Desktop" | 7.0 Search vendor "Redhat" for product "Enterprise Linux Desktop" and version "7.0" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Enterprise Linux Eus Search vendor "Redhat" for product "Enterprise Linux Eus" | 8.1 Search vendor "Redhat" for product "Enterprise Linux Eus" and version "8.1" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Enterprise Linux Eus Search vendor "Redhat" for product "Enterprise Linux Eus" | 8.2 Search vendor "Redhat" for product "Enterprise Linux Eus" and version "8.2" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Enterprise Linux Eus Search vendor "Redhat" for product "Enterprise Linux Eus" | 8.4 Search vendor "Redhat" for product "Enterprise Linux Eus" and version "8.4" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Enterprise Linux For Real Time Search vendor "Redhat" for product "Enterprise Linux For Real Time" | 7 Search vendor "Redhat" for product "Enterprise Linux For Real Time" and version "7" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Enterprise Linux For Real Time Search vendor "Redhat" for product "Enterprise Linux For Real Time" | 8 Search vendor "Redhat" for product "Enterprise Linux For Real Time" and version "8" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Enterprise Linux For Real Time For Nfv Search vendor "Redhat" for product "Enterprise Linux For Real Time For Nfv" | 7 Search vendor "Redhat" for product "Enterprise Linux For Real Time For Nfv" and version "7" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Enterprise Linux For Real Time For Nfv Search vendor "Redhat" for product "Enterprise Linux For Real Time For Nfv" | 8 Search vendor "Redhat" for product "Enterprise Linux For Real Time For Nfv" and version "8" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Enterprise Linux For Real Time For Nfv Tus Search vendor "Redhat" for product "Enterprise Linux For Real Time For Nfv Tus" | 8.2 Search vendor "Redhat" for product "Enterprise Linux For Real Time For Nfv Tus" and version "8.2" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Enterprise Linux For Real Time For Nfv Tus Search vendor "Redhat" for product "Enterprise Linux For Real Time For Nfv Tus" | 8.4 Search vendor "Redhat" for product "Enterprise Linux For Real Time For Nfv Tus" and version "8.4" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Enterprise Linux For Real Time Tus Search vendor "Redhat" for product "Enterprise Linux For Real Time Tus" | 8.2 Search vendor "Redhat" for product "Enterprise Linux For Real Time Tus" and version "8.2" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Enterprise Linux For Real Time Tus Search vendor "Redhat" for product "Enterprise Linux For Real Time Tus" | 8.4 Search vendor "Redhat" for product "Enterprise Linux For Real Time Tus" and version "8.4" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Enterprise Linux Server Search vendor "Redhat" for product "Enterprise Linux Server" | 7.0 Search vendor "Redhat" for product "Enterprise Linux Server" and version "7.0" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Enterprise Linux Server Aus Search vendor "Redhat" for product "Enterprise Linux Server Aus" | 8.2 Search vendor "Redhat" for product "Enterprise Linux Server Aus" and version "8.2" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Enterprise Linux Server Aus Search vendor "Redhat" for product "Enterprise Linux Server Aus" | 8.4 Search vendor "Redhat" for product "Enterprise Linux Server Aus" and version "8.4" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Enterprise Linux Server Tus Search vendor "Redhat" for product "Enterprise Linux Server Tus" | 8.2 Search vendor "Redhat" for product "Enterprise Linux Server Tus" and version "8.2" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Enterprise Linux Server Tus Search vendor "Redhat" for product "Enterprise Linux Server Tus" | 8.4 Search vendor "Redhat" for product "Enterprise Linux Server Tus" and version "8.4" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Enterprise Linux Workstation Search vendor "Redhat" for product "Enterprise Linux Workstation" | 7.0 Search vendor "Redhat" for product "Enterprise Linux Workstation" and version "7.0" | - |
Affected
|