Information Exposure Affecting bpftool package, versions <0:3.10.0-1062.el7
Threat Intelligence
EPSS
0.2% (59th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-CENTOS7-BPFTOOL-2138210
- published 26 Jul 2021
- disclosed 11 Jan 2019
Introduced: 11 Jan 2019
CVE-2019-3460 Open this link in a new tabHow to fix?
Upgrade Centos:7
bpftool
to version 0:3.10.0-1062.el7 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream bpftool
package and not the bpftool
package as distributed by Centos
.
See How to fix?
for Centos:7
relevant fixed versions and status.
A heap data infoleak in multiple locations including L2CAP_PARSE_CONF_RSP was found in the Linux kernel before 5.1-rc1.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=1663179
- https://git.kernel.org/linus/af3d5d1c87664a4f150fcf3534c6567cb19909b0
- https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-3460.html
- https://access.redhat.com/security/cve/CVE-2019-3460
- https://lists.debian.org/debian-lts-announce/2019/05/msg00002.html
- https://lists.debian.org/debian-lts-announce/2019/05/msg00041.html
- https://lists.debian.org/debian-lts-announce/2019/05/msg00042.html
- https://lore.kernel.org/linux-bluetooth/20190110062917.GB15047@kroah.com/
- https://marc.info/?l=oss-security&m=154721580222522&w=2
- http://www.openwall.com/lists/oss-security/2019/06/27/2
- http://www.openwall.com/lists/oss-security/2019/06/27/7
- http://www.openwall.com/lists/oss-security/2019/06/28/1
- http://www.openwall.com/lists/oss-security/2019/06/28/2
- http://www.openwall.com/lists/oss-security/2019/08/12/1
- https://access.redhat.com/errata/RHSA-2019:2029
- https://lore.kernel.org/linux-bluetooth/20190110062917.GB15047%40kroah.com/
CVSS Scores
version 3.1