Lucene search

K
cveLinuxCVE-2019-25160
HistoryFeb 26, 2024 - 6:15 p.m.

CVE-2019-25160

2024-02-2618:15:06
CWE-125
Linux
web.nvd.nist.gov
929
cve-2019-25160
linux kernel
netlabel
vulnerability
fix
nvd
security
patch
memory access

CVSS3

7.1

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H

AI Score

6.4

Confidence

Low

EPSS

0

Percentile

5.1%

In the Linux kernel, the following vulnerability has been resolved:

netlabel: fix out-of-bounds memory accesses

There are two array out-of-bounds memory accesses, one in
cipso_v4_map_lvl_valid(), the other in netlbl_bitmap_walk(). Both
errors are embarassingly simple, and the fixes are straightforward.

As a FYI for anyone backporting this patch to kernels prior to v4.8,
you’ll want to apply the netlbl_bitmap_walk() patch to
cipso_v4_bitmap_walk() as netlbl_bitmap_walk() doesn’t exist before
Linux v4.8.

Affected configurations

Nvd
Vulners
Node
linuxlinux_kernelRange2.6.193.16.66
OR
linuxlinux_kernelRange3.17.03.18.137
OR
linuxlinux_kernelRange3.19.04.4.177
OR
linuxlinux_kernelRange4.5.04.9.163
OR
linuxlinux_kernelRange4.10.04.14.106
OR
linuxlinux_kernelRange4.15.04.19.28
OR
linuxlinux_kernelRange4.20.04.20.15
VendorProductVersionCPE
linuxlinux_kernel*cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

CNA Affected

[
  {
    "product": "Linux",
    "vendor": "Linux",
    "defaultStatus": "unaffected",
    "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
    "programFiles": [
      "net/ipv4/cipso_ipv4.c",
      "net/netlabel/netlabel_kapi.c"
    ],
    "versions": [
      {
        "version": "446fda4f2682",
        "lessThan": "97bc3683c249",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "446fda4f2682",
        "lessThan": "c61d01faa555",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "446fda4f2682",
        "lessThan": "dc18101f95fa",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "446fda4f2682",
        "lessThan": "1c973f9c7cc2",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "446fda4f2682",
        "lessThan": "fcfe700acdc1",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "446fda4f2682",
        "lessThan": "e3713abc4248",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "446fda4f2682",
        "lessThan": "fbf9578919d6",
        "status": "affected",
        "versionType": "git"
      },
      {
        "version": "446fda4f2682",
        "lessThan": "5578de4834fe",
        "status": "affected",
        "versionType": "git"
      }
    ]
  },
  {
    "product": "Linux",
    "vendor": "Linux",
    "defaultStatus": "affected",
    "repo": "https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git",
    "programFiles": [
      "net/ipv4/cipso_ipv4.c",
      "net/netlabel/netlabel_kapi.c"
    ],
    "versions": [
      {
        "version": "2.6.19",
        "status": "affected"
      },
      {
        "version": "0",
        "lessThan": "2.6.19",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "3.16.66",
        "lessThanOrEqual": "3.16.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "3.18.137",
        "lessThanOrEqual": "3.18.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "4.4.177",
        "lessThanOrEqual": "4.4.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "4.9.163",
        "lessThanOrEqual": "4.9.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "4.14.106",
        "lessThanOrEqual": "4.14.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "4.19.28",
        "lessThanOrEqual": "4.19.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "4.20.15",
        "lessThanOrEqual": "4.20.*",
        "status": "unaffected",
        "versionType": "custom"
      },
      {
        "version": "5.0",
        "lessThanOrEqual": "*",
        "status": "unaffected",
        "versionType": "original_commit_for_fix"
      }
    ]
  }
]

CVSS3

7.1

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H

AI Score

6.4

Confidence

Low

EPSS

0

Percentile

5.1%