CVE-2019-16714

In the Linux kernel before 5.2.14, rds6_inc_info_copy in net/rds/recv.c allows attackers to obtain sensitive information from kernel stack memory because tos and flags fields are not initialized.
Configurations

Configuration 1 (hide)

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:a:f5:traffix_signaling_delivery_controller:*:*:*:*:*:*:*:*

History

21 Nov 2024, 04:31

Type Values Removed Values Added
References () http://www.openwall.com/lists/oss-security/2019/09/24/2 - Mailing List, Third Party Advisory () http://www.openwall.com/lists/oss-security/2019/09/24/2 - Mailing List, Third Party Advisory
References () http://www.openwall.com/lists/oss-security/2019/09/25/1 - Mailing List, Third Party Advisory () http://www.openwall.com/lists/oss-security/2019/09/25/1 - Mailing List, Third Party Advisory
References () https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.14 - Mailing List, Vendor Advisory () https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.14 - Mailing List, Vendor Advisory
References () https://github.com/torvalds/linux/commit/7d0a06586b2686ba80c4a2da5f91cb10ffbea736 - Patch, Third Party Advisory () https://github.com/torvalds/linux/commit/7d0a06586b2686ba80c4a2da5f91cb10ffbea736 - Patch, Third Party Advisory
References () https://security.netapp.com/advisory/ntap-20191031-0005/ - Third Party Advisory () https://security.netapp.com/advisory/ntap-20191031-0005/ - Third Party Advisory
References () https://support.f5.com/csp/article/K48351130?utm_source=f5support&amp%3Butm_medium=RSS - () https://support.f5.com/csp/article/K48351130?utm_source=f5support&amp%3Butm_medium=RSS -
References () https://usn.ubuntu.com/4157-1/ - Third Party Advisory () https://usn.ubuntu.com/4157-1/ - Third Party Advisory
References () https://usn.ubuntu.com/4157-2/ - Third Party Advisory () https://usn.ubuntu.com/4157-2/ - Third Party Advisory

07 Nov 2023, 03:05

Type Values Removed Values Added
References
  • {'url': 'https://support.f5.com/csp/article/K48351130?utm_source=f5support&utm_medium=RSS', 'name': 'https://support.f5.com/csp/article/K48351130?utm_source=f5support&utm_medium=RSS', 'tags': ['Third Party Advisory'], 'refsource': 'CONFIRM'}
  • () https://support.f5.com/csp/article/K48351130?utm_source=f5support&amp%3Butm_medium=RSS -

Information

Published : 2019-09-23 12:15

Updated : 2024-11-21 04:31


NVD link : CVE-2019-16714

Mitre link : CVE-2019-16714

CVE.ORG link : CVE-2019-16714


JSON object : View

Products Affected

canonical

  • ubuntu_linux

linux

  • linux_kernel

f5

  • traffix_signaling_delivery_controller
CWE
CWE-909

Missing Initialization of Resource