First published: Mon Jun 03 2019(Updated: )
In uvc_parse_standard_control of uvc_driver.c, there is a possible out-of-bound read due to improper input validation. This could lead to local information disclosure with no additional execution privileges needed. User interaction is not needed for exploitation. Product: Android. Versions: Android kernel. Android ID: A-111760968.
Credit: security@android.com
Affected Software | Affected Version | How to fix |
---|---|---|
Android | ||
Debian | =8.0 | |
Ubuntu Linux | =16.04 | |
Ubuntu Linux | =18.04 | |
Android | ||
Ubuntu | =16.04 | |
Ubuntu | =18.04 | |
debian/linux | 5.10.223-1 5.10.234-1 6.1.123-1 6.1.128-1 6.12.12-1 6.12.17-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-2101 is classified as a potential information disclosure vulnerability.
To mitigate CVE-2019-2101, update the affected Android version or apply the latest patches provided by your Linux distribution.
CVE-2019-2101 is due to improper input validation in the uvc_parse_standard_control function.
CVE-2019-2101 affects various versions of Android as well as some distributions of Debian and Ubuntu.
No, user interaction is not necessary for the exploitation of CVE-2019-2101.