Information Exposure Affecting perf package, versions <0:4.18.0-147.el8
Threat Intelligence
EPSS
0.28% (70th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-RHEL8-PERF-3492468
- published 26 Jul 2021
- disclosed 11 Jan 2019
Introduced: 11 Jan 2019
CVE-2019-3459 Open this link in a new tabHow to fix?
Upgrade RHEL:8
perf
to version 0:4.18.0-147.el8 or higher.
This issue was patched in RHSA-2019:3517
.
NVD Description
Note: Versions mentioned in the description apply only to the upstream perf
package and not the perf
package as distributed by RHEL
.
See How to fix?
for RHEL:8
relevant fixed versions and status.
A heap address information leak while using L2CAP_GET_CONF_OPT was discovered in the Linux kernel before 5.1-rc1.
References
- https://bugzilla.novell.com/show_bug.cgi?id=1120758
- https://bugzilla.redhat.com/show_bug.cgi?id=1663176
- https://git.kernel.org/linus/7c9cbd0b5e38a1672fcd137894ace3b042dfbf69
- https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-3459.html
- https://access.redhat.com/security/cve/CVE-2019-3459
- https://lists.debian.org/debian-lts-announce/2019/05/msg00002.html
- https://lists.debian.org/debian-lts-announce/2019/05/msg00041.html
- https://lists.debian.org/debian-lts-announce/2019/05/msg00042.html
- https://lore.kernel.org/linux-bluetooth/20190110062833.GA15047@kroah.com/
- https://marc.info/?l=oss-security&m=154721580222522&w=2
- http://www.openwall.com/lists/oss-security/2019/06/27/2
- http://www.openwall.com/lists/oss-security/2019/06/27/7
- http://www.openwall.com/lists/oss-security/2019/06/28/1
- http://www.openwall.com/lists/oss-security/2019/06/28/2
- http://www.openwall.com/lists/oss-security/2019/08/12/1
- https://access.redhat.com/errata/RHSA-2019:3517
- https://lore.kernel.org/linux-bluetooth/20190110062833.GA15047%40kroah.com/
CVSS Scores
version 3.1