7.1 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
6.5 Medium
AI Score
Confidence
High
0.0004 Low
EPSS
Percentile
5.1%
In the Linux kernel, the following vulnerability has been resolved:
netlabel: fix out-of-bounds memory accesses There are two array
out-of-bounds memory accesses, one in cipso_v4_map_lvl_valid(), the other
in netlbl_bitmap_walk(). Both errors are embarassingly simple, and the
fixes are straightforward. As a FYI for anyone backporting this patch to
kernels prior to v4.8, you’ll want to apply the netlbl_bitmap_walk() patch
to cipso_v4_bitmap_walk() as netlbl_bitmap_walk() doesn’t exist before
Linux v4.8.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | linux | < any | UNKNOWN |
ubuntu | 16.04 | noarch | linux | < 4.4.0-146.172 | UNKNOWN |
ubuntu | 18.04 | noarch | linux-aws | < any | UNKNOWN |
ubuntu | 14.04 | noarch | linux-aws | < 4.4.0-1042.45 | UNKNOWN |
ubuntu | 16.04 | noarch | linux-aws | < 4.4.0-1081.91 | UNKNOWN |
ubuntu | 16.04 | noarch | linux-aws-hwe | < 4.15.0-1047.49~16.04.1 | UNKNOWN |
ubuntu | 14.04 | noarch | linux-azure | < 4.15.0-1059.64~14.04.1 | UNKNOWN |
ubuntu | 16.04 | noarch | linux-azure | < 4.15.0-1056.61 | UNKNOWN |
ubuntu | 16.04 | noarch | linux-gcp | < 4.15.0-1041.43 | UNKNOWN |
ubuntu | 16.04 | noarch | linux-hwe | < 4.15.0-60.67~16.04.1 | UNKNOWN |
git.kernel.org/linus/5578de4834fe0f2a34fedc7374be691443396d1f (5.0)
git.kernel.org/stable/c/1c973f9c7cc2b3caae93192fdc8ecb3f0b4ac000
git.kernel.org/stable/c/5578de4834fe0f2a34fedc7374be691443396d1f
git.kernel.org/stable/c/97bc3683c24999ee621d847c9348c75d2fe86272
git.kernel.org/stable/c/c61d01faa5550e06794dcf86125ccd325bfad950
git.kernel.org/stable/c/dc18101f95fa6e815f426316b8b9a5cee28a334e
git.kernel.org/stable/c/e3713abc4248aa6bcc11173d754c418b02a62cbb
git.kernel.org/stable/c/fbf9578919d6c91100ec63acf2cba641383f6c78
git.kernel.org/stable/c/fcfe700acdc1c72eab231300e82b962bac2b2b2c
launchpad.net/bugs/cve/CVE-2019-25160
nvd.nist.gov/vuln/detail/CVE-2019-25160
security-tracker.debian.org/tracker/CVE-2019-25160
www.cve.org/CVERecord?id=CVE-2019-25160
7.1 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H
6.5 Medium
AI Score
Confidence
High
0.0004 Low
EPSS
Percentile
5.1%