CVE Vulnerabilities

CVE-2019-16714

Missing Initialization of Resource

Published: Sep 23, 2019 | Modified: Nov 21, 2024
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CVSS 2.x
5 MEDIUM
AV:N/AC:L/Au:N/C:P/I:N/A:N
RedHat/V2
RedHat/V3
7.5 MODERATE
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Ubuntu
LOW
root.io logo minimus.io logo echo.ai logo

In the Linux kernel before 5.2.14, rds6_inc_info_copy in net/rds/recv.c allows attackers to obtain sensitive information from kernel stack memory because tos and flags fields are not initialized.

Weakness

The product does not initialize a critical resource.

Affected Software

NameVendorStart VersionEnd Version
Linux_kernelLinux*5.2.14 (excluding)
LinuxUbuntudisco*
LinuxUbuntuesm-infra-legacy/trusty*
LinuxUbuntuprecise/esm*
LinuxUbuntutrusty*
LinuxUbuntutrusty/esm*
LinuxUbuntuupstream*
Linux-awsUbuntudisco*
Linux-awsUbuntuesm-infra-legacy/trusty*
Linux-awsUbuntutrusty*
Linux-awsUbuntutrusty/esm*
Linux-awsUbuntuupstream*
Linux-aws-5.0Ubuntuupstream*
Linux-aws-hweUbuntuupstream*
Linux-azureUbuntubionic*
Linux-azureUbuntudisco*
Linux-azureUbuntuesm-infra-legacy/trusty*
Linux-azureUbuntuesm-infra/bionic*
Linux-azureUbuntutrusty*
Linux-azureUbuntutrusty/esm*
Linux-azureUbuntuupstream*
Linux-azure-5.3Ubuntuupstream*
Linux-azure-edgeUbuntubionic*
Linux-azure-edgeUbuntuesm-infra/bionic*
Linux-azure-edgeUbuntuupstream*
Linux-gcpUbuntubionic*
Linux-gcpUbuntudisco*
Linux-gcpUbuntuesm-infra/bionic*
Linux-gcpUbuntuupstream*
Linux-gcp-5.3Ubuntuupstream*
Linux-gcp-edgeUbuntubionic*
Linux-gcp-edgeUbuntuesm-infra/bionic*
Linux-gcp-edgeUbuntuupstream*
Linux-gke-4.15Ubuntuupstream*
Linux-gke-5.0Ubuntubionic*
Linux-gke-5.0Ubuntuupstream*
Linux-gke-5.3Ubuntuupstream*
Linux-hweUbuntubionic*
Linux-hweUbuntuesm-infra/bionic*
Linux-hweUbuntuupstream*
Linux-hwe-edgeUbuntubionic*
Linux-hwe-edgeUbuntuesm-infra/bionic*
Linux-hwe-edgeUbuntuupstream*
Linux-kvmUbuntudisco*
Linux-kvmUbuntuupstream*
Linux-lts-trustyUbuntuprecise/esm*
Linux-lts-trustyUbuntuupstream*
Linux-lts-xenialUbuntuesm-infra-legacy/trusty*
Linux-lts-xenialUbuntutrusty*
Linux-lts-xenialUbuntutrusty/esm*
Linux-lts-xenialUbuntuupstream*
Linux-oemUbuntuupstream*
Linux-oemUbuntuxenial*
Linux-oem-5.6Ubuntuupstream*
Linux-oem-osp1Ubuntubionic*
Linux-oem-osp1Ubuntudisco*
Linux-oem-osp1Ubuntueoan*
Linux-oem-osp1Ubuntuupstream*
Linux-oracleUbuntudisco*
Linux-oracleUbuntuupstream*
Linux-oracle-5.0Ubuntuupstream*
Linux-oracle-5.3Ubuntuupstream*
Linux-raspi2Ubuntudisco*
Linux-raspi2Ubuntuupstream*
Linux-raspi2-5.3Ubuntuupstream*
Linux-snapdragonUbuntudisco*
Linux-snapdragonUbuntuupstream*

Potential Mitigations

References