Vulnerability Name: | CVE-2019-16921 (CCN-168244) |
Assigned: | 2018-03-19 |
Published: | 2018-03-19 |
Updated: | 2019-09-27 |
Summary: | In the Linux kernel before 4.17, hns_roce_alloc_ucontext in drivers/infiniband/hw/hns/hns_roce_main.c does not initialize the resp data structure, which might allow attackers to obtain sensitive information from kernel stack memory, aka CID-df7e40425813.
|
CVSS v3 Severity: | 7.5 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N) 6.5 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C)Exploitability Metrics: | Attack Vector (AV): Network Attack Complexity (AC): Low Privileges Required (PR): None User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): High Integrity (I): None Availibility (A): None | 6.2 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N) 5.4 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C)Exploitability Metrics: | Attack Vector (AV): Local Attack Complexity (AC): Low Privileges Required (PR): None User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): High Integrity (I): None Availibility (A): None |
|
CVSS v2 Severity: | 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Low Authentication (Au): None | Impact Metrics: | Confidentiality (C): Partial Integrity (I): None Availibility (A): None | 4.9 Medium (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:N/A:N)Exploitability Metrics: | Access Vector (AV): Local Access Complexity (AC): Low Athentication (Au): None
| Impact Metrics: | Confidentiality (C): Complete Integrity (I): None Availibility (A): None |
|
Vulnerability Type: | CWE-665
|
Vulnerability Consequences: | Obtain Information |
References: | Source: MITRE Type: CNA CVE-2019-16921
Source: XF Type: UNKNOWN linux-kernel-cve201916921-info-disc(168244)
Source: MISC Type: Patch, Vendor Advisory https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=df7e40425813c50cd252e6f5e348a81ef1acae56
Source: CCN Type: Linux Kernel GIT Repository RDMA/hns: Fix init resp when alloc ucontext
Source: MISC Type: Patch, Third Party Advisory https://github.com/torvalds/linux/commit/df7e40425813c50cd252e6f5e348a81ef1acae56
Source: CCN Type: WhiteSource Vulnerability Database CVE-2019-16921
|
Vulnerable Configuration: | Configuration 1: cpe:/o:linux:linux_kernel:*:*:*:*:*:*:*:* (Version < 4.17) Configuration CCN 1: cpe:/o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:3.3:-:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:3.4:-:*:*:*:*:*:*OR cpe:/a:accelatech:bizsearch:3.2:-:~~~linux_kernel~~:*:*:*:*:*OR cpe:/o:linux:linux_kernel:3.1:-:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:3:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:3.5:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:3.7:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:3.8:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:3.6:-:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:3.9.0:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:3.10:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:3.11:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:3.12:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:3.13:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:3.14:-:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:3.15:-:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:3.16.0:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:3.17:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:4.2:-:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:4.3:-:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:4.5:-:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:4.6:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:4.1.0:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:4.7.0:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:4.9:-:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:4.10:-:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:4.8.0:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:4.11:-:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:3.18:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:4.12:-:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:4.13.0:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:4.15:-:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:4.14:*:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:4.16:-:*:*:*:*:*:*OR cpe:/o:linux:linux_kernel:4.0:*:*:*:*:*:*:*
Denotes that component is vulnerable |
Oval Definitions |
|
BACK |