Vulnerability Name:

CVE-2019-16714 (CCN-167373)

Assigned:2019-08-26
Published:2019-08-26
Updated:2022-03-31
Summary:In the Linux kernel before 5.2.14, rds6_inc_info_copy in net/rds/recv.c allows attackers to obtain sensitive information from kernel stack memory because tos and flags fields are not initialized.
CVSS v3 Severity:7.5 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)
6.5 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): None
Availibility (A): None
7.5 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)
6.5 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): None
Availibility (A): None
CVSS v2 Severity:5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): None
7.8 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:N/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): None
Availibility (A): None
Vulnerability Type:CWE-909
Vulnerability Consequences:Obtain Information
References:Source: MITRE
Type: CNA
CVE-2019-16714

Source: MLIST
Type: Mailing List, Third Party Advisory
[oss-security] 20190924 CVE-2019-16714: info leak in RDS rds6_inc_info_copy

Source: MLIST
Type: Mailing List, Third Party Advisory
[oss-security] 20190925 CVE-2019-16714: Linux kernel net/rds: info leak vulnerability in rds6_inc_info_copy

Source: MISC
Type: Mailing List, Vendor Advisory
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.14

Source: XF
Type: UNKNOWN
linux-cve201916714-info-disc(167373)

Source: CCN
Type: Linux Kernel GIT Repository
net/rds: Fix info leak in rds6_inc_info_copy()

Source: MISC
Type: Patch, Third Party Advisory
https://github.com/torvalds/linux/commit/7d0a06586b2686ba80c4a2da5f91cb10ffbea736

Source: CONFIRM
Type: Third Party Advisory
https://security.netapp.com/advisory/ntap-20191031-0005/

Source: CONFIRM
Type: Third Party Advisory
https://support.f5.com/csp/article/K48351130?utm_source=f5support&utm_medium=RSS

Source: UBUNTU
Type: Third Party Advisory
USN-4157-1

Source: UBUNTU
Type: Third Party Advisory
USN-4157-2

Source: CCN
Type: IBM Security Bulletin 3177579 (Spectrum Protect Plus)
Multiple vulnerabilities in Linux Kernel affect IBM Spectrum Protect Plus

Source: CCN
Type: IBM Security Bulletin 6214294 (Security Guardium)
IBM Security Guardium is affected by kernel vulnerabilities

Source: CCN
Type: WhiteSource Vulnerability Database
CVE-2019-16714

Vulnerable Configuration:Configuration 1:
  • cpe:/o:linux:linux_kernel:*:*:*:*:*:*:*:* (Version < 5.2.14)

  • Configuration 2:
  • cpe:/o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
  • OR cpe:/o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*

  • Configuration 3:
  • cpe:/a:f5:traffix_signaling_delivery_controller:*:*:*:*:*:*:*:* (Version >= 5.0.0 and <= 5.1.0)

  • Configuration CCN 1:
  • cpe:/o:linux:linux_kernel:5.2.13:*:*:*:*:*:*:*
  • AND
  • cpe:/a:ibm:spectrum_protect_plus:10.1.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:security_guardium:10.6:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:infosphere_guardium_activity_monitor:10.6:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:spectrum_protect_plus:10.1.5:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:security_guardium:11.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:security_guardium:11.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:infosphere_guardium_activity_monitor:11.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:infosphere_guardium_activity_monitor:11.1:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:com.ubuntu.disco:def:2019167140000000
    V
    CVE-2019-16714 on Ubuntu 19.04 (disco) - low.
    2019-09-23
    oval:com.ubuntu.bionic:def:2019167140000000
    V
    CVE-2019-16714 on Ubuntu 18.04 LTS (bionic) - low.
    2019-09-23
    oval:com.ubuntu.xenial:def:2019167140000000
    V
    CVE-2019-16714 on Ubuntu 16.04 LTS (xenial) - low.
    2019-09-23
    BACK
    linux linux kernel *
    canonical ubuntu linux 18.04
    canonical ubuntu linux 19.04
    f5 traffix signaling delivery controller *
    linux linux kernel 5.2.13
    ibm spectrum protect plus 10.1.0
    ibm security guardium 10.6
    ibm infosphere guardium activity monitor 10.6
    ibm spectrum protect plus 10.1.5
    ibm security guardium 11.0
    ibm security guardium 11.1
    ibm infosphere guardium activity monitor 11.0
    ibm infosphere guardium activity monitor 11.1