In the Linux kernel before 5.2.14, rds6incinfo_copy in net/rds/recv.c allows attackers to obtain sensitive information from kernel stack memory because tos and flags fields are not initialized.
{
"unresolved_ranges": [
{
"source": "CPE_FIELD",
"extracted_events": [
{
"introduced": "5.0.0"
},
{
"last_affected": "5.1.0"
}
],
"cpe": "cpe:2.3:a:f5:traffix_signaling_delivery_controller:*:*:*:*:*:*:*:*"
},
{
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "18.04"
}
],
"cpe": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*"
},
{
"source": "CPE_FIELD",
"extracted_events": [
{
"last_affected": "19.04"
}
],
"cpe": "cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*"
},
{
"source": "CPE_FIELD",
"extracted_events": [
{
"fixed": "5.2.14"
}
],
"cpe": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*"
},
{
"source": "DESCRIPTION",
"extracted_events": [
{
"fixed": "5.2.14"
}
]
}
]
}"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2019-16714.json"
[
{
"signature_version": "v1",
"source": "https://github.com/torvalds/linux/commit/7d0a06586b2686ba80c4a2da5f91cb10ffbea736",
"id": "CVE-2019-16714-5aa6f8ac",
"digest": {
"length": 547.0,
"function_hash": "323175174116006736367617789921837833552"
},
"signature_type": "Function",
"target": {
"file": "net/rds/recv.c",
"function": "rds6_inc_info_copy"
},
"deprecated": false
},
{
"signature_version": "v1",
"source": "https://github.com/torvalds/linux/commit/7d0a06586b2686ba80c4a2da5f91cb10ffbea736",
"id": "CVE-2019-16714-6d680486",
"digest": {
"line_hashes": [
"255212118642456291440683210435881102075",
"270208186230961866274760800974596681779",
"167062064257216133080716191825438507670",
"30770943032444953230003529903219742171",
"299424386392896070712404146147839370278",
"253315866562584575356851045810074718981",
"331498920963108893021588706279381112765",
"174353265596285021529529645320588734242"
],
"threshold": 0.9
},
"signature_type": "Line",
"target": {
"file": "net/rds/recv.c"
},
"deprecated": false
}
]
"2026-04-11T20:52:25Z"