Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2019-2101

Опубликовано: 07 июн. 2019
Источник: debian

Описание

In uvc_parse_standard_control of uvc_driver.c, there is a possible out-of-bound read due to improper input validation. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android kernel. Android ID: A-111760968.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed4.19.37-1package
linuxfixed4.9.168-1stretchpackage

Примечания

  • https://git.kernel.org/linus/47bb117911b051bbc90764a8bff96543cbd2005f

Связанные уязвимости

CVSS3: 5.5
ubuntu
больше 6 лет назад

In uvc_parse_standard_control of uvc_driver.c, there is a possible out-of-bound read due to improper input validation. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android kernel. Android ID: A-111760968.

CVSS3: 5.5
nvd
больше 6 лет назад

In uvc_parse_standard_control of uvc_driver.c, there is a possible out-of-bound read due to improper input validation. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android kernel. Android ID: A-111760968.

CVSS3: 5.5
github
больше 3 лет назад

In uvc_parse_standard_control of uvc_driver.c, there is a possible out-of-bound read due to improper input validation. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android kernel. Android ID: A-111760968.

CVSS3: 5.5
fstec
больше 6 лет назад

Уязвимость функции uvc_parse_standard_control (uvc_driver.c) ядра операционной системы Android, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации