A heap address information leak while using L2CAP_GET_CONF_OPT was discovered in the Linux kernel before 5.1-rc1.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
History
07 Nov 2023, 03:09
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
22 Apr 2022, 20:05
Type | Values Removed | Values Added |
---|---|---|
First Time |
Redhat codeready Linux Builder
Redhat enterprise Linux For Real Time Tus Redhat enterprise Linux Desktop Redhat enterprise Linux Server Redhat enterprise Linux For Real Time For Nfv Redhat enterprise Linux Eus Redhat enterprise Linux Server Tus Redhat enterprise Linux Workstation Redhat enterprise Linux Server Aus Redhat enterprise Linux For Real Time For Nfv Tus Redhat enterprise Linux For Real Time |
|
References | (MLIST) http://www.openwall.com/lists/oss-security/2019/06/27/2 - Mailing List, Third Party Advisory | |
References | (MLIST) http://www.openwall.com/lists/oss-security/2019/06/27/7 - Mailing List, Third Party Advisory | |
References | (MLIST) http://www.openwall.com/lists/oss-security/2019/08/12/1 - Mailing List, Third Party Advisory | |
References | (MLIST) http://www.openwall.com/lists/oss-security/2019/06/28/2 - Mailing List, Third Party Advisory | |
References | (REDHAT) https://access.redhat.com/errata/RHSA-2019:2043 - Third Party Advisory | |
References | (REDHAT) https://access.redhat.com/errata/RHSA-2019:3309 - Third Party Advisory | |
References | (MLIST) https://marc.info/?l=oss-security&m=154721580222522&w=2 - Exploit, Mailing List, Third Party Advisory | |
References | (REDHAT) https://access.redhat.com/errata/RHSA-2019:2029 - Third Party Advisory | |
References | (MLIST) https://lists.debian.org/debian-lts-announce/2019/05/msg00041.html - Mailing List, Third Party Advisory | |
References | (MLIST) https://lists.debian.org/debian-lts-announce/2019/05/msg00042.html - Mailing List, Third Party Advisory | |
References | (REDHAT) https://access.redhat.com/errata/RHSA-2019:3517 - Third Party Advisory | |
References | (REDHAT) https://access.redhat.com/errata/RHSA-2020:0740 - Third Party Advisory | |
References | (MLIST) http://www.openwall.com/lists/oss-security/2019/06/28/1 - Mailing List, Third Party Advisory | |
CWE | CWE-125 | |
CPE | cpe:2.3:o:redhat:enterprise_linux_for_real_time_tus:8.4:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_real_time_tus:8.2:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv_tus:8.2:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv_tus:8.4:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_real_time:7:*:*:*:*:*:*:* cpe:2.3:a:redhat:codeready_linux_builder:8.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_real_time:8:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv:7:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv:8:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:* |
21 Jul 2021, 11:39
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:redhat:enterprise_mrg:2.0:*:*:*:*:*:*:* | |
References | (CONFIRM) https://bugzilla.redhat.com/show_bug.cgi?id=1663176 - Mitigation, Issue Tracking, Third Party Advisory |
Information
Published : 2019-04-11 16:29
Updated : 2023-12-10 12:59
NVD link : CVE-2019-3459
Mitre link : CVE-2019-3459
CVE.ORG link : CVE-2019-3459
JSON object : View
Products Affected
redhat
- enterprise_linux
- enterprise_linux_eus
- enterprise_linux_server
- enterprise_linux_desktop
- enterprise_linux_server_tus
- enterprise_linux_for_real_time_tus
- enterprise_linux_workstation
- enterprise_linux_for_real_time
- enterprise_mrg
- enterprise_linux_for_real_time_for_nfv
- codeready_linux_builder
- enterprise_linux_server_aus
- enterprise_linux_for_real_time_for_nfv_tus
canonical
- ubuntu_linux
debian
- debian_linux
linux
- linux_kernel
CWE
CWE-125
Out-of-bounds Read