A heap data infoleak in multiple locations including L2CAP_PARSE_CONF_RSP was found in the Linux kernel before 5.1-rc1.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
History
07 Nov 2023, 03:09
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
22 Apr 2022, 20:06
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_real_time_tus:8.4:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:8.1:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_real_time_tus:8.2:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv_tus:8.2:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_tus:8.4:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:8.2:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv_tus:8.4:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_real_time:7:*:*:*:*:*:*:* cpe:2.3:a:redhat:codeready_linux_builder:8.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_real_time:8:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv:7:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_tus:8.2:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_for_real_time_for_nfv:8:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:* |
|
References | (MLIST) http://www.openwall.com/lists/oss-security/2019/06/27/2 - Mailing List, Third Party Advisory | |
References | (MLIST) http://www.openwall.com/lists/oss-security/2019/06/27/7 - Mailing List, Third Party Advisory | |
References | (MLIST) http://www.openwall.com/lists/oss-security/2019/08/12/1 - Mailing List, Third Party Advisory | |
References | (MLIST) http://www.openwall.com/lists/oss-security/2019/06/28/2 - Mailing List, Third Party Advisory | |
References | (REDHAT) https://access.redhat.com/errata/RHSA-2019:2043 - Third Party Advisory | |
References | (REDHAT) https://access.redhat.com/errata/RHSA-2019:3309 - Third Party Advisory | |
References | (REDHAT) https://access.redhat.com/errata/RHSA-2019:2029 - Third Party Advisory | |
References | (MLIST) https://lists.debian.org/debian-lts-announce/2019/05/msg00041.html - Mailing List, Third Party Advisory | |
References | (MLIST) https://lists.debian.org/debian-lts-announce/2019/05/msg00042.html - Mailing List, Third Party Advisory | |
References | (REDHAT) https://access.redhat.com/errata/RHSA-2019:3517 - Third Party Advisory | |
References | (REDHAT) https://access.redhat.com/errata/RHSA-2020:0740 - Third Party Advisory | |
References | (MLIST) http://www.openwall.com/lists/oss-security/2019/06/28/1 - Mailing List, Third Party Advisory | |
First Time |
Redhat codeready Linux Builder
Redhat enterprise Linux For Real Time Tus Redhat enterprise Linux Desktop Redhat enterprise Linux Server Redhat enterprise Linux For Real Time For Nfv Redhat enterprise Linux Eus Redhat enterprise Linux Server Tus Redhat enterprise Linux Workstation Redhat enterprise Linux Server Aus Redhat enterprise Linux Redhat enterprise Linux For Real Time For Nfv Tus Redhat enterprise Linux For Real Time Redhat virtualization Host Redhat |
|
CWE | CWE-20 |
21 Jul 2021, 11:39
Type | Values Removed | Values Added |
---|---|---|
References | (CONFIRM) https://bugzilla.redhat.com/show_bug.cgi?id=1663179 - Mitigation, Issue Tracking, Third Party Advisory |
Information
Published : 2019-04-11 16:29
Updated : 2023-12-10 12:59
NVD link : CVE-2019-3460
Mitre link : CVE-2019-3460
CVE.ORG link : CVE-2019-3460
JSON object : View
Products Affected
redhat
- enterprise_linux
- enterprise_linux_eus
- enterprise_linux_server
- enterprise_linux_desktop
- enterprise_linux_server_tus
- virtualization_host
- enterprise_linux_for_real_time_tus
- enterprise_linux_workstation
- enterprise_linux_for_real_time
- enterprise_linux_for_real_time_for_nfv
- codeready_linux_builder
- enterprise_linux_server_aus
- enterprise_linux_for_real_time_for_nfv_tus
canonical
- ubuntu_linux
debian
- debian_linux
linux
- linux_kernel
CWE
CWE-20
Improper Input Validation