First published: Mon Sep 23 2019(Updated: )
In the Linux kernel before 5.2.14, rds6_inc_info_copy in net/rds/recv.c allows attackers to obtain sensitive information from kernel stack memory because tos and flags fields are not initialized.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/linux | 5.10.223-1 5.10.226-1 6.1.123-1 6.1.119-1 6.12.10-1 | |
Linux Kernel | <5.2.14 | |
Ubuntu Linux | =18.04 | |
Ubuntu Linux | =19.04 | |
F5 Traffix Systems Signaling Delivery Controller | >=5.0.0<=5.1.0 |
Ensure that /etc/modprobe.d/blacklist-rare-network.conf contains the following lines: # rds alias net-pf-21 off
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2019-16714.
The vulnerability allows attackers to obtain sensitive information from kernel stack memory.
The affected software includes various versions of the Linux kernel.
To fix this vulnerability, update your Linux kernel to version 5.2.14 or higher.
You can find more information about this vulnerability in the references provided.