Out-of-bounds Read Affecting kernel-debug-modules package, versions *
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-CENTOS8-KERNELDEBUGMODULES-6291726
- published 28 Feb 2024
- disclosed 26 Feb 2024
Introduced: 26 Feb 2024
CVE-2019-25160 Open this link in a new tabHow to fix?
There is no fixed version for Centos:8
kernel-debug-modules
.
NVD Description
Note: Versions mentioned in the description apply only to the upstream kernel-debug-modules
package and not the kernel-debug-modules
package as distributed by Centos
.
See How to fix?
for Centos:8
relevant fixed versions and status.
In the Linux kernel, the following vulnerability has been resolved:
netlabel: fix out-of-bounds memory accesses
There are two array out-of-bounds memory accesses, one in cipso_v4_map_lvl_valid(), the other in netlbl_bitmap_walk(). Both errors are embarassingly simple, and the fixes are straightforward.
As a FYI for anyone backporting this patch to kernels prior to v4.8, you'll want to apply the netlbl_bitmap_walk() patch to cipso_v4_bitmap_walk() as netlbl_bitmap_walk() doesn't exist before Linux v4.8.
References
- https://access.redhat.com/security/cve/CVE-2019-25160
- https://git.kernel.org/stable/c/1c973f9c7cc2b3caae93192fdc8ecb3f0b4ac000
- https://git.kernel.org/stable/c/5578de4834fe0f2a34fedc7374be691443396d1f
- https://git.kernel.org/stable/c/97bc3683c24999ee621d847c9348c75d2fe86272
- https://git.kernel.org/stable/c/c61d01faa5550e06794dcf86125ccd325bfad950
- https://git.kernel.org/stable/c/dc18101f95fa6e815f426316b8b9a5cee28a334e
- https://git.kernel.org/stable/c/e3713abc4248aa6bcc11173d754c418b02a62cbb
- https://git.kernel.org/stable/c/fbf9578919d6c91100ec63acf2cba641383f6c78
- https://git.kernel.org/stable/c/fcfe700acdc1c72eab231300e82b962bac2b2b2c