CVE-2019-11884
moderate-risk
Published 2019-05-10
The do_hidp_sock_ioctl function in net/bluetooth/hidp/sock.c in the Linux kernel before 5.0.15 allows a local user to obtain potentially sensitive information from kernel stack memory via a HIDPCONNADD command, because a name field may not end with a '\0' character.
Do I need to act?
-
0.05% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
3
CVSS 3.3/10
Low
LOCAL
/ LOW complexity
Affected Products (20)
References (46)
Broken Link
http://www.securityfocus.com/bid/108299
Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:3309
Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:3517
Third Party Advisory
https://access.redhat.com/errata/RHSA-2020:0740
Mailing List
https://seclists.org/bugtraq/2019/Jun/26
Third Party Advisory
https://usn.ubuntu.com/4068-1/
Third Party Advisory
https://usn.ubuntu.com/4068-2/
Third Party Advisory
https://usn.ubuntu.com/4069-1/
Third Party Advisory
https://usn.ubuntu.com/4069-2/
and 26 more references
35
/ 100
moderate-risk
Severity
13/34 · Low
Exploitability
0/34 · Minimal
Exposure
22/34 · High