← Zuruck zu CVEs
CVE-2019-14835
HIGH7.8
Beschreibung
A buffer overflow flaw was found, in versions from 2.6.34 to 5.2.x, in the way Linux kernel's vhost functionality that translates virtqueue buffers to IOVs, logged the buffer descriptors during migration. A privileged guest user able to pass descriptors with invalid length to the host when migration is underway, could use this flaw to increase their privileges on the host.
CVE Details
CVSS v3.1 Bewertung7.8
SchweregradHIGH
CVSS VektorCVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AngriffsvektorLOCAL
KomplexitatLOW
Erforderliche PrivilegienLOW
BenutzerinteraktionNONE
Veroffentlicht9/17/2019
Zuletzt geandert11/21/2024
Quellenvd
Honeypot-Sichtungen0
Betroffene Produkte
canonical:ubuntu_linuxdebian:debian_linuxfedoraproject:fedorahuawei:imanager_netecohuawei:imanager_neteco_6000huawei:manageonelinux:linux_kernelnetapp:aff_a700snetapp:aff_a700s_firmwarenetapp:data_availability_servicesnetapp:h300enetapp:h300e_firmwarenetapp:h300snetapp:h300s_firmwarenetapp:h410cnetapp:h410c_firmwarenetapp:h410snetapp:h410s_firmwarenetapp:h500enetapp:h500e_firmwarenetapp:h500snetapp:h500s_firmwarenetapp:h610snetapp:h610s_firmwarenetapp:h700enetapp:h700e_firmwarenetapp:h700snetapp:h700s_firmwarenetapp:hci_management_nodenetapp:service_processornetapp:solidfirenetapp:steelstore_cloud_integrated_storageopensuse:leapredhat:enterprise_linuxredhat:enterprise_linux_desktopredhat:enterprise_linux_eusredhat:enterprise_linux_for_real_timeredhat:enterprise_linux_serverredhat:enterprise_linux_server_ausredhat:enterprise_linux_server_tusredhat:enterprise_linux_workstationredhat:openshift_container_platformredhat:virtualizationredhat:virtualization_host
Schwachen (CWE)
CWE-120CWE-120
Referenzen
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html(secalert@redhat.com)
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html(secalert@redhat.com)
http://packetstormsecurity.com/files/154572/Kernel-Live-Patch-Security-Notice-LSN-0056-1.html(secalert@redhat.com)
http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html(secalert@redhat.com)
http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html(secalert@redhat.com)
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-qemu-en(secalert@redhat.com)
http://www.openwall.com/lists/oss-security/2019/09/24/1(secalert@redhat.com)
http://www.openwall.com/lists/oss-security/2019/10/03/1(secalert@redhat.com)
http://www.openwall.com/lists/oss-security/2019/10/09/3(secalert@redhat.com)
http://www.openwall.com/lists/oss-security/2019/10/09/7(secalert@redhat.com)
https://access.redhat.com/errata/RHBA-2019:2824(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2019:2827(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2019:2828(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2019:2829(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2019:2830(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2019:2854(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2019:2862(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2019:2863(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2019:2864(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2019:2865(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2019:2866(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2019:2867(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2019:2869(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2019:2889(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2019:2899(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2019:2900(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2019:2901(secalert@redhat.com)
https://access.redhat.com/errata/RHSA-2019:2924(secalert@redhat.com)
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14835(secalert@redhat.com)
https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html(secalert@redhat.com)
https://lists.debian.org/debian-lts-announce/2019/10/msg00000.html(secalert@redhat.com)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KQFY6JYFIQ2VFQ7QCSXPWTUL5ZDNCJL5/(secalert@redhat.com)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YW3QNMPENPFEGVTOFPSNOBL7JEIJS25P/(secalert@redhat.com)
https://seclists.org/bugtraq/2019/Nov/11(secalert@redhat.com)
https://seclists.org/bugtraq/2019/Sep/41(secalert@redhat.com)
https://security.netapp.com/advisory/ntap-20191031-0005/(secalert@redhat.com)
https://usn.ubuntu.com/4135-1/(secalert@redhat.com)
https://usn.ubuntu.com/4135-2/(secalert@redhat.com)
https://www.debian.org/security/2019/dsa-4531(secalert@redhat.com)
https://www.openwall.com/lists/oss-security/2019/09/17/1(secalert@redhat.com)
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html(af854a3a-2127-422b-91ae-364da2661108)
http://packetstormsecurity.com/files/154572/Kernel-Live-Patch-Security-Notice-LSN-0056-1.html(af854a3a-2127-422b-91ae-364da2661108)
http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html(af854a3a-2127-422b-91ae-364da2661108)
http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-qemu-en(af854a3a-2127-422b-91ae-364da2661108)
http://www.openwall.com/lists/oss-security/2019/09/24/1(af854a3a-2127-422b-91ae-364da2661108)
http://www.openwall.com/lists/oss-security/2019/10/03/1(af854a3a-2127-422b-91ae-364da2661108)
http://www.openwall.com/lists/oss-security/2019/10/09/3(af854a3a-2127-422b-91ae-364da2661108)
http://www.openwall.com/lists/oss-security/2019/10/09/7(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHBA-2019:2824(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:2827(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:2828(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:2829(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:2830(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:2854(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:2862(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:2863(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:2864(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:2865(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:2866(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:2867(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:2869(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:2889(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:2899(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:2900(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:2901(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2019:2924(af854a3a-2127-422b-91ae-364da2661108)
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14835(af854a3a-2127-422b-91ae-364da2661108)
https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html(af854a3a-2127-422b-91ae-364da2661108)
https://lists.debian.org/debian-lts-announce/2019/10/msg00000.html(af854a3a-2127-422b-91ae-364da2661108)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KQFY6JYFIQ2VFQ7QCSXPWTUL5ZDNCJL5/(af854a3a-2127-422b-91ae-364da2661108)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YW3QNMPENPFEGVTOFPSNOBL7JEIJS25P/(af854a3a-2127-422b-91ae-364da2661108)
https://seclists.org/bugtraq/2019/Nov/11(af854a3a-2127-422b-91ae-364da2661108)
https://seclists.org/bugtraq/2019/Sep/41(af854a3a-2127-422b-91ae-364da2661108)
https://security.netapp.com/advisory/ntap-20191031-0005/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/4135-1/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/4135-2/(af854a3a-2127-422b-91ae-364da2661108)
https://www.debian.org/security/2019/dsa-4531(af854a3a-2127-422b-91ae-364da2661108)
https://www.openwall.com/lists/oss-security/2019/09/17/1(af854a3a-2127-422b-91ae-364da2661108)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.