CVE-2019-3460
kernel: Heap address information leak while using L2CAP_PARSE_CONF_RSP
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
A heap data infoleak in multiple locations including L2CAP_PARSE_CONF_RSP was found in the Linux kernel before 5.1-rc1.
Se ha descubierto una fuga de información en múltiples ubicaciones en memoria dinámica, incluyendo L2CAP_GET_CONF_OPT en el kernel de Linux anterior a 5.1-rc1.
A flaw was found in the Linux kernel's implementation of logical link control and adaptation protocol (L2CAP), part of the Bluetooth stack in the l2cap_parse_conf_rsp and l2cap_parse_conf_req functions. An attacker with physical access within the range of standard Bluetooth transmission can create a specially crafted packet. The response to this specially crafted packet can contain part of the kernel stack which can be used in a further attack.
M. Vefa Bicakci and Andy Lutomirski discovered that the kernel did not properly set up all arguments to an error handler callback used when running as a paravirtualized guest. An unprivileged attacker in a paravirtualized guest VM could use this to cause a denial of service. It was discovered that the KVM implementation in the Linux kernel on ARM 64bit processors did not properly handle some ioctls. An attacker with the privilege to create KVM-based virtual machines could use this to cause a denial of service or execute arbitrary code in the host. Various other issues were also addressed.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2018-12-31 CVE Reserved
- 2019-04-03 CVE Published
- 2024-08-04 CVE Updated
- 2024-08-04 First Exploit
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-20: Improper Input Validation
- CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CAPEC
References (19)
URL | Tag | Source |
---|---|---|
http://www.openwall.com/lists/oss-security/2019/06/27/2 | Mailing List |
|
http://www.openwall.com/lists/oss-security/2019/06/27/7 | Mailing List |
|
http://www.openwall.com/lists/oss-security/2019/06/28/1 | Mailing List |
|
http://www.openwall.com/lists/oss-security/2019/06/28/2 | Mailing List |
|
http://www.openwall.com/lists/oss-security/2019/08/12/1 | Mailing List |
|
https://lists.debian.org/debian-lts-announce/2019/05/msg00002.html | Mailing List |
|
https://lists.debian.org/debian-lts-announce/2019/05/msg00041.html | Mailing List |
|
https://lists.debian.org/debian-lts-announce/2019/05/msg00042.html | Mailing List |
|
https://lore.kernel.org/linux-bluetooth/20190110062917.GB15047%40kroah.com | Mailing List | |
https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-3460.html | Third Party Advisory |
URL | Date | SRC |
---|---|---|
https://marc.info/?l=oss-security&m=154721580222522&w=2 | 2024-08-04 |
URL | Date | SRC |
---|---|---|
https://git.kernel.org/linus/af3d5d1c87664a4f150fcf3534c6567cb19909b0 | 2023-11-07 |
URL | Date | SRC |
---|---|---|
https://access.redhat.com/errata/RHSA-2019:2029 | 2023-11-07 | |
https://access.redhat.com/errata/RHSA-2019:2043 | 2023-11-07 | |
https://access.redhat.com/errata/RHSA-2019:3309 | 2023-11-07 | |
https://access.redhat.com/errata/RHSA-2019:3517 | 2023-11-07 | |
https://access.redhat.com/errata/RHSA-2020:0740 | 2023-11-07 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1663179 | 2020-03-09 | |
https://access.redhat.com/security/cve/CVE-2019-3460 | 2020-03-09 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Linux Search vendor "Linux" | Linux Kernel Search vendor "Linux" for product "Linux Kernel" | <= 5.1 Search vendor "Linux" for product "Linux Kernel" and version " <= 5.1" | - |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 14.04 Search vendor "Canonical" for product "Ubuntu Linux" and version "14.04" | lts |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 16.04 Search vendor "Canonical" for product "Ubuntu Linux" and version "16.04" | lts |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 18.04 Search vendor "Canonical" for product "Ubuntu Linux" and version "18.04" | lts |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 18.10 Search vendor "Canonical" for product "Ubuntu Linux" and version "18.10" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 8.0 Search vendor "Debian" for product "Debian Linux" and version "8.0" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Codeready Linux Builder Search vendor "Redhat" for product "Codeready Linux Builder" | 8.0 Search vendor "Redhat" for product "Codeready Linux Builder" and version "8.0" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Virtualization Host Search vendor "Redhat" for product "Virtualization Host" | 4.0 Search vendor "Redhat" for product "Virtualization Host" and version "4.0" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Enterprise Linux Search vendor "Redhat" for product "Enterprise Linux" | 8.0 Search vendor "Redhat" for product "Enterprise Linux" and version "8.0" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Enterprise Linux Desktop Search vendor "Redhat" for product "Enterprise Linux Desktop" | 7.0 Search vendor "Redhat" for product "Enterprise Linux Desktop" and version "7.0" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Enterprise Linux Eus Search vendor "Redhat" for product "Enterprise Linux Eus" | 8.1 Search vendor "Redhat" for product "Enterprise Linux Eus" and version "8.1" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Enterprise Linux Eus Search vendor "Redhat" for product "Enterprise Linux Eus" | 8.2 Search vendor "Redhat" for product "Enterprise Linux Eus" and version "8.2" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Enterprise Linux Eus Search vendor "Redhat" for product "Enterprise Linux Eus" | 8.4 Search vendor "Redhat" for product "Enterprise Linux Eus" and version "8.4" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Enterprise Linux For Real Time Search vendor "Redhat" for product "Enterprise Linux For Real Time" | 7 Search vendor "Redhat" for product "Enterprise Linux For Real Time" and version "7" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Enterprise Linux For Real Time Search vendor "Redhat" for product "Enterprise Linux For Real Time" | 8 Search vendor "Redhat" for product "Enterprise Linux For Real Time" and version "8" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Enterprise Linux For Real Time For Nfv Search vendor "Redhat" for product "Enterprise Linux For Real Time For Nfv" | 7 Search vendor "Redhat" for product "Enterprise Linux For Real Time For Nfv" and version "7" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Enterprise Linux For Real Time For Nfv Search vendor "Redhat" for product "Enterprise Linux For Real Time For Nfv" | 8 Search vendor "Redhat" for product "Enterprise Linux For Real Time For Nfv" and version "8" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Enterprise Linux For Real Time For Nfv Tus Search vendor "Redhat" for product "Enterprise Linux For Real Time For Nfv Tus" | 8.2 Search vendor "Redhat" for product "Enterprise Linux For Real Time For Nfv Tus" and version "8.2" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Enterprise Linux For Real Time For Nfv Tus Search vendor "Redhat" for product "Enterprise Linux For Real Time For Nfv Tus" | 8.4 Search vendor "Redhat" for product "Enterprise Linux For Real Time For Nfv Tus" and version "8.4" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Enterprise Linux For Real Time Tus Search vendor "Redhat" for product "Enterprise Linux For Real Time Tus" | 8.2 Search vendor "Redhat" for product "Enterprise Linux For Real Time Tus" and version "8.2" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Enterprise Linux For Real Time Tus Search vendor "Redhat" for product "Enterprise Linux For Real Time Tus" | 8.4 Search vendor "Redhat" for product "Enterprise Linux For Real Time Tus" and version "8.4" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Enterprise Linux Server Search vendor "Redhat" for product "Enterprise Linux Server" | 7.0 Search vendor "Redhat" for product "Enterprise Linux Server" and version "7.0" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Enterprise Linux Server Aus Search vendor "Redhat" for product "Enterprise Linux Server Aus" | 8.2 Search vendor "Redhat" for product "Enterprise Linux Server Aus" and version "8.2" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Enterprise Linux Server Aus Search vendor "Redhat" for product "Enterprise Linux Server Aus" | 8.4 Search vendor "Redhat" for product "Enterprise Linux Server Aus" and version "8.4" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Enterprise Linux Server Tus Search vendor "Redhat" for product "Enterprise Linux Server Tus" | 8.2 Search vendor "Redhat" for product "Enterprise Linux Server Tus" and version "8.2" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Enterprise Linux Server Tus Search vendor "Redhat" for product "Enterprise Linux Server Tus" | 8.4 Search vendor "Redhat" for product "Enterprise Linux Server Tus" and version "8.4" | - |
Affected
| ||||||
Redhat Search vendor "Redhat" | Enterprise Linux Workstation Search vendor "Redhat" for product "Enterprise Linux Workstation" | 7.0 Search vendor "Redhat" for product "Enterprise Linux Workstation" and version "7.0" | - |
Affected
|