Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2019-16714

Опубликовано: 23 сент. 2019
Источник: debian
EPSS Низкий

Описание

In the Linux kernel before 5.2.14, rds6_inc_info_copy in net/rds/recv.c allows attackers to obtain sensitive information from kernel stack memory because tos and flags fields are not initialized.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
linuxfixed5.2.17-1package
linuxfixed4.19.87-1busterpackage
linuxnot-affectedstretchpackage
linuxnot-affectedjessiepackage

Примечания

  • https://git.kernel.org/linus/7d0a06586b2686ba80c4a2da5f91cb10ffbea736

EPSS

Процентиль: 78%
0.01117
Низкий

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 6 лет назад

In the Linux kernel before 5.2.14, rds6_inc_info_copy in net/rds/recv.c allows attackers to obtain sensitive information from kernel stack memory because tos and flags fields are not initialized.

CVSS3: 7.5
redhat
больше 6 лет назад

In the Linux kernel before 5.2.14, rds6_inc_info_copy in net/rds/recv.c allows attackers to obtain sensitive information from kernel stack memory because tos and flags fields are not initialized.

CVSS3: 7.5
nvd
больше 6 лет назад

In the Linux kernel before 5.2.14, rds6_inc_info_copy in net/rds/recv.c allows attackers to obtain sensitive information from kernel stack memory because tos and flags fields are not initialized.

CVSS3: 7.5
github
больше 3 лет назад

In the Linux kernel before 5.2.14, rds6_inc_info_copy in net/rds/recv.c allows attackers to obtain sensitive information from kernel stack memory because tos and flags fields are not initialized.

EPSS

Процентиль: 78%
0.01117
Низкий