Lucene search

K
nvd416baaa9-dc9f-4396-8d5f-8c081fb06d67NVD:CVE-2019-25160
HistoryFeb 26, 2024 - 6:15 p.m.

CVE-2019-25160

2024-02-2618:15:06
CWE-125
416baaa9-dc9f-4396-8d5f-8c081fb06d67
web.nvd.nist.gov
4
netlabel
out-of-bounds
memory accesses
cipso_v4_map_lvl_valid
netlbl_bitmap_walk
backporting
patch
linux v4.8

CVSS3

7.1

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H

AI Score

7

Confidence

High

EPSS

0

Percentile

5.1%

In the Linux kernel, the following vulnerability has been resolved:

netlabel: fix out-of-bounds memory accesses

There are two array out-of-bounds memory accesses, one in
cipso_v4_map_lvl_valid(), the other in netlbl_bitmap_walk(). Both
errors are embarassingly simple, and the fixes are straightforward.

As a FYI for anyone backporting this patch to kernels prior to v4.8,
you’ll want to apply the netlbl_bitmap_walk() patch to
cipso_v4_bitmap_walk() as netlbl_bitmap_walk() doesn’t exist before
Linux v4.8.

Affected configurations

Nvd
Node
linuxlinux_kernelRange2.6.193.16.66
OR
linuxlinux_kernelRange3.17.03.18.137
OR
linuxlinux_kernelRange3.19.04.4.177
OR
linuxlinux_kernelRange4.5.04.9.163
OR
linuxlinux_kernelRange4.10.04.14.106
OR
linuxlinux_kernelRange4.15.04.19.28
OR
linuxlinux_kernelRange4.20.04.20.15
VendorProductVersionCPE
linuxlinux_kernel*cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

CVSS3

7.1

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H

AI Score

7

Confidence

High

EPSS

0

Percentile

5.1%