TROYANOSYVIRUS
Zuruck zu CVEs

CVE-2019-14835

HIGH
7.8

Beschreibung

A buffer overflow flaw was found, in versions from 2.6.34 to 5.2.x, in the way Linux kernel's vhost functionality that translates virtqueue buffers to IOVs, logged the buffer descriptors during migration. A privileged guest user able to pass descriptors with invalid length to the host when migration is underway, could use this flaw to increase their privileges on the host.

CVE Details

CVSS v3.1 Bewertung7.8
SchweregradHIGH
CVSS VektorCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AngriffsvektorLOCAL
KomplexitatLOW
Erforderliche PrivilegienLOW
BenutzerinteraktionNONE
Veroffentlicht9/17/2019
Zuletzt geandert11/21/2024
Quellenvd
Honeypot-Sichtungen0

Betroffene Produkte

canonical:ubuntu_linuxdebian:debian_linuxfedoraproject:fedorahuawei:imanager_netecohuawei:imanager_neteco_6000huawei:manageonelinux:linux_kernelnetapp:aff_a700snetapp:aff_a700s_firmwarenetapp:data_availability_servicesnetapp:h300enetapp:h300e_firmwarenetapp:h300snetapp:h300s_firmwarenetapp:h410cnetapp:h410c_firmwarenetapp:h410snetapp:h410s_firmwarenetapp:h500enetapp:h500e_firmwarenetapp:h500snetapp:h500s_firmwarenetapp:h610snetapp:h610s_firmwarenetapp:h700enetapp:h700e_firmwarenetapp:h700snetapp:h700s_firmwarenetapp:hci_management_nodenetapp:service_processornetapp:solidfirenetapp:steelstore_cloud_integrated_storageopensuse:leapredhat:enterprise_linuxredhat:enterprise_linux_desktopredhat:enterprise_linux_eusredhat:enterprise_linux_for_real_timeredhat:enterprise_linux_serverredhat:enterprise_linux_server_ausredhat:enterprise_linux_server_tusredhat:enterprise_linux_workstationredhat:openshift_container_platformredhat:virtualizationredhat:virtualization_host

Schwachen (CWE)

CWE-120CWE-120

Referenzen

https://usn.ubuntu.com/4135-1/(secalert@redhat.com)
https://usn.ubuntu.com/4135-2/(secalert@redhat.com)
http://www.openwall.com/lists/oss-security/2019/09/24/1(af854a3a-2127-422b-91ae-364da2661108)
http://www.openwall.com/lists/oss-security/2019/10/03/1(af854a3a-2127-422b-91ae-364da2661108)
http://www.openwall.com/lists/oss-security/2019/10/09/3(af854a3a-2127-422b-91ae-364da2661108)
http://www.openwall.com/lists/oss-security/2019/10/09/7(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHBA-2019:2824(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:2827(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:2828(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:2829(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:2830(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:2854(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:2862(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:2863(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:2864(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:2865(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:2866(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:2867(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:2869(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:2889(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:2899(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:2900(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:2901(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:2924(af854a3a-2127-422b-91ae-364da2661108)
https://seclists.org/bugtraq/2019/Nov/11(af854a3a-2127-422b-91ae-364da2661108)
https://seclists.org/bugtraq/2019/Sep/41(af854a3a-2127-422b-91ae-364da2661108)
https://security.netapp.com/advisory/ntap-20191031-0005/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/4135-1/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/4135-2/(af854a3a-2127-422b-91ae-364da2661108)
https://www.debian.org/security/2019/dsa-4531(af854a3a-2127-422b-91ae-364da2661108)
https://www.openwall.com/lists/oss-security/2019/09/17/1(af854a3a-2127-422b-91ae-364da2661108)

IOC Korrelationen

Keine Korrelationen erfasst

This product uses data from the NVD API but is not endorsed or certified by the NVD.