CVE-2019-14835

high
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

A buffer overflow flaw was found, in versions from 2.6.34 to 5.2.x, in the way Linux kernel's vhost functionality that translates virtqueue buffers to IOVs, logged the buffer descriptors during migration. A privileged guest user able to pass descriptors with invalid length to the host when migration is underway, could use this flaw to increase their privileges on the host.

References

https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14835

https://www.openwall.com/lists/oss-security/2019/09/17/1

https://usn.ubuntu.com/4135-2/

https://lists.fedoraproject.org/archives/list/[email protected]/message/KQFY6JYFIQ2VFQ7QCSXPWTUL5ZDNCJL5/

https://access.redhat.com/errata/RHSA-2019:2828

https://access.redhat.com/errata/RHSA-2019:2827

https://access.redhat.com/errata/RHSA-2019:2830

https://access.redhat.com/errata/RHSA-2019:2829

https://access.redhat.com/errata/RHSA-2019:2854

https://access.redhat.com/errata/RHSA-2019:2863

https://access.redhat.com/errata/RHSA-2019:2862

https://access.redhat.com/errata/RHSA-2019:2865

https://access.redhat.com/errata/RHSA-2019:2864

https://access.redhat.com/errata/RHSA-2019:2866

https://access.redhat.com/errata/RHSA-2019:2867

https://access.redhat.com/errata/RHSA-2019:2869

http://packetstormsecurity.com/files/154572/Kernel-Live-Patch-Security-Notice-LSN-0056-1.html

http://www.openwall.com/lists/oss-security/2019/09/24/1

https://access.redhat.com/errata/RHSA-2019:2889

http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html

http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html

https://seclists.org/bugtraq/2019/Sep/41

https://www.debian.org/security/2019/dsa-4531

https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html

https://access.redhat.com/errata/RHSA-2019:2900

https://access.redhat.com/errata/RHSA-2019:2901

https://access.redhat.com/errata/RHSA-2019:2899

https://access.redhat.com/errata/RHSA-2019:2924

https://usn.ubuntu.com/4135-1/

https://lists.debian.org/debian-lts-announce/2019/10/msg00000.html

https://lists.fedoraproject.org/archives/list/[email protected]/message/YW3QNMPENPFEGVTOFPSNOBL7JEIJS25P/

http://www.openwall.com/lists/oss-security/2019/10/03/1

http://www.openwall.com/lists/oss-security/2019/10/09/3

http://www.openwall.com/lists/oss-security/2019/10/09/7

https://access.redhat.com/errata/RHBA-2019:2824

http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html

https://security.netapp.com/advisory/ntap-20191031-0005/

https://seclists.org/bugtraq/2019/Nov/11

http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html

http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-qemu-en

Details

Source: MITRE

Published: 2019-09-17

Updated: 2021-06-02

Type: CWE-120

Risk Information

CVSS v2

Base Score: 7.2

Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Impact Score: 10

Exploitability Score: 3.9

Severity: HIGH

CVSS v3

Base Score: 7.8

Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Impact Score: 5.9

Exploitability Score: 1.8

Severity: HIGH

Vulnerable Software

Configuration 1

OR

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

cpe:2.3:o:linux:linux_kernel:5.3:*:*:*:*:*:*:*

Configuration 2

OR

cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*

cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*

cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*

cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*

cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*

Configuration 3

OR

cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

Configuration 4

OR

cpe:2.3:o:fedoraproject:fedora:29:*:*:*:*:*:*:*

cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*

Configuration 5

OR

cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*

cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*

Configuration 6

AND

OR

cpe:2.3:o:netapp:aff_a700s_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:netapp:aff_a700s:*:*:*:*:*:*:*:*

Configuration 7

AND

OR

cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:netapp:h410c:*:*:*:*:*:*:*:*

Configuration 8

AND

OR

cpe:2.3:o:netapp:h610s_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:netapp:h610s:*:*:*:*:*:*:*:*

Configuration 9

AND

OR

cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:netapp:h300s:*:*:*:*:*:*:*:*

Configuration 10

AND

OR

cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:netapp:h500s:*:*:*:*:*:*:*:*

Configuration 11

AND

OR

cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:netapp:h700s:*:*:*:*:*:*:*:*

Configuration 12

AND

OR

cpe:2.3:o:netapp:h300e_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:netapp:h300e:*:*:*:*:*:*:*:*

Configuration 13

AND

OR

cpe:2.3:o:netapp:h500e_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:netapp:h500e:*:*:*:*:*:*:*:*

Configuration 14

AND

OR

cpe:2.3:o:netapp:h700e_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:netapp:h700e:*:*:*:*:*:*:*:*

Configuration 15

AND

OR

cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*

OR

cpe:2.3:h:netapp:h410s:*:*:*:*:*:*:*:*

Configuration 16

OR

cpe:2.3:a:netapp:_steelstore_cloud_integrated_storage:-:*:*:*:*:*:*:*

cpe:2.3:a:netapp:data_availability_services:-:*:*:*:*:*:*:*

cpe:2.3:a:netapp:hci_management_node:-:*:*:*:*:*:*:*

cpe:2.3:a:netapp:service_processor:-:*:*:*:*:*:*:*

cpe:2.3:a:netapp:solidfire:-:*:*:*:*:*:*:*

Configuration 17

OR

cpe:2.3:a:redhat:openshift_container_platform:3.11:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_for_real_time:7:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_for_real_time:8:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server:7.6:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*

Configuration 18

AND

OR

cpe:2.3:a:redhat:virtualization:4.0:*:*:*:*:*:*:*

cpe:2.3:a:redhat:virtualization_host:4.0:*:*:*:*:*:*:*

OR

cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*

Configuration 19

OR

cpe:2.3:a:huawei:imanager_neteco:v600r009c00:*:*:*:*:*:*:*

cpe:2.3:a:huawei:imanager_neteco:v600r009c10spc200:*:*:*:*:*:*:*

cpe:2.3:a:huawei:imanager_neteco_6000:v600r008c10spc300:*:*:*:*:*:*:*

cpe:2.3:a:huawei:imanager_neteco_6000:v600r008c20:*:*:*:*:*:*:*

cpe:2.3:a:huawei:manageone:6.5.0:*:*:*:*:*:*:*

cpe:2.3:a:huawei:manageone:6.5.0.spc100.b210:*:*:*:*:*:*:*

cpe:2.3:a:huawei:manageone:6.5.1rc1.b060:*:*:*:*:*:*:*

cpe:2.3:a:huawei:manageone:6.5.1rc1.b080:*:*:*:*:*:*:*

cpe:2.3:a:huawei:manageone:6.5.rc2.b050:*:*:*:*:*:*:*

Tenable Plugins

View all (71 total)

IDNameProductFamilySeverity
150533SUSE SLES11 Security Update : kernel (SUSE-SU-2019:14218-1)NessusSuSE Local Security Checks
critical
145638CentOS 8 : kernel (CESA-2019:2827)NessusCentOS Local Security Checks
high
134486EulerOS Virtualization for ARM 64 3.0.2.0 : kernel (EulerOS-SA-2020-1197)NessusHuawei Local Security Checks
critical
133459Virtuozzo 7 : readykernel-patch (VZA-2019-074)NessusVirtuozzo Local Security Checks
high
132925SUSE SLES12 Security Update : kernel (SUSE-SU-2020:0093-1)NessusSuSE Local Security Checks
critical
132495NewStart CGSL CORE 5.05 / MAIN 5.05 : kernel-rt Multiple Vulnerabilities (NS-SA-2019-0253)NessusNewStart CGSL Local Security Checks
high
132474NewStart CGSL CORE 5.05 / MAIN 5.05 : kernel Multiple Vulnerabilities (NS-SA-2019-0247)NessusNewStart CGSL Local Security Checks
high
131845EulerOS 2.0 SP2 : kernel (EulerOS-SA-2019-2353)NessusHuawei Local Security Checks
critical
131833SUSE SLES12 Security Update : kernel (SUSE-SU-2019:3200-1)NessusSuSE Local Security Checks
high
131776NewStart CGSL MAIN 4.06 : kernel Multiple Vulnerabilities (NS-SA-2019-0212)NessusNewStart CGSL Local Security Checks
high
131474EulerOS Virtualization for ARM 64 3.0.3.0 : kernel (EulerOS-SA-2019-2309)NessusHuawei Local Security Checks
critical
131227Virtuozzo 6 : parallels-server-bm-release / vzkernel / etc (VZA-2019-089)NessusVirtuozzo Local Security Checks
high
131208OracleVM 3.4 : Unbreakable / etc (OVMSA-2019-0056)NessusOracleVM Local Security Checks
high
131174Oracle Linux 6 / 7 : Unbreakable Enterprise kernel (ELSA-2019-4850)NessusOracle Linux Local Security Checks
high
131120SUSE SLES12 Security Update : kernel (SUSE-SU-2019:2984-1)NessusSuSE Local Security Checks
critical
130950SUSE SLES12 Security Update : kernel (SUSE-SU-2019:2950-1) (SACK Panic)NessusSuSE Local Security Checks
critical
130949SUSE SLES12 Security Update : kernel (SUSE-SU-2019:2949-1)NessusSuSE Local Security Checks
critical
130751Slackware 14.2 : Slackware 14.2 kernel (SSA:2019-311-01)NessusSlackware Local Security Checks
critical
130736EulerOS 2.0 SP3 : kernel (EulerOS-SA-2019-2274)NessusHuawei Local Security Checks
critical
130663EulerOS 2.0 SP5 : kernel (EulerOS-SA-2019-2201)NessusHuawei Local Security Checks
critical
130423SUSE SLES12 Security Update : kernel (SUSE-SU-2019:2821-1) (SACK Panic) (SACK Slowness)NessusSuSE Local Security Checks
high
130163SUSE SLED15 / SLES15 Security Update : kernel (SUSE-SU-2019:2738-1)NessusSuSE Local Security Checks
critical
130120Photon OS 3.0: Linux PHSA-2019-3.0-0034NessusPhotonOS Local Security Checks
high
129924NewStart CGSL CORE 5.04 / MAIN 5.04 : kernel Multiple Vulnerabilities (NS-SA-2019-0200)NessusNewStart CGSL Local Security Checks
high
129888NewStart CGSL CORE 5.04 / MAIN 5.04 : kernel-rt Multiple Vulnerabilities (NS-SA-2019-0189)NessusNewStart CGSL Local Security Checks
high
129845SUSE SLES12 Security Update : kernel (SUSE-SU-2019:2648-1)NessusSuSE Local Security Checks
critical
129841Oracle Linux 7 : Unbreakable Enterprise kernel (ELSA-2019-4820)NessusOracle Linux Local Security Checks
high
129785Photon OS 1.0: Linux PHSA-2019-1.0-0252NessusPhotonOS Local Security Checks
high
129748SUSE SLES12 Security Update : kernel (SUSE-SU-2019:2613-1)NessusSuSE Local Security Checks
high
129747SUSE SLES12 Security Update : kernel (SUSE-SU-2019:2601-1)NessusSuSE Local Security Checks
high
129746SUSE SLES12 Security Update : kernel (SUSE-SU-2019:2600-1)NessusSuSE Local Security Checks
critical
129683Photon OS 1.0: Linux PHSA-2019-1.0-0255NessusPhotonOS Local Security Checks
high
129538CentOS 7 : kernel (CESA-2019:2829)NessusCentOS Local Security Checks
high
129512Fedora 29 : kernel / kernel-headers / kernel-tools (2019-a570a92d5a)NessusFedora Local Security Checks
high
129505Debian DLA-1940-1 : linux-4.9 security updateNessusDebian Local Security Checks
high
129479RHEL 7 : Virtualization Manager (RHSA-2019:2924)NessusRed Hat Local Security Checks
high
129471CentOS 6 : kernel (CESA-2019:2863)NessusCentOS Local Security Checks
high
129440EulerOS 2.0 SP8 : kernel (EulerOS-SA-2019-2081)NessusHuawei Local Security Checks
critical
129407Amazon Linux AMI : kernel (ALAS-2019-1293)NessusAmazon Linux Local Security Checks
high
129392Amazon Linux 2 : kernel (ALAS-2019-1293)NessusAmazon Linux Local Security Checks
high
129374RHEL 6 : kernel (RHSA-2019:2901)NessusRed Hat Local Security Checks
high
129373RHEL 7 : kernel (RHSA-2019:2900)NessusRed Hat Local Security Checks
high
129372RHEL 7 : kernel (RHSA-2019:2899)NessusRed Hat Local Security Checks
high
129371RHEL 7 : Virtualization Manager (RHSA-2019:2889)NessusRed Hat Local Security Checks
high
129361Debian DLA-1930-1 : linux security updateNessusDebian Local Security Checks
critical
129345openSUSE Security Update : the Linux Kernel (openSUSE-2019-2181)NessusSuSE Local Security Checks
critical
129339openSUSE Security Update : the Linux Kernel (openSUSE-2019-2173)NessusSuSE Local Security Checks
critical
129306Debian DSA-4531-1 : linux - security updateNessusDebian Local Security Checks
high
129278Scientific Linux Security Update : kernel on SL6.x i386/x86_64 (20190923)NessusScientific Linux Local Security Checks
high
129274RHEL 6 : kernel (RHSA-2019:2869)NessusRed Hat Local Security Checks
high
129272RHEL 7 : kernel (RHSA-2019:2867)NessusRed Hat Local Security Checks
high
129271RHEL 7 : kernel (RHSA-2019:2866)NessusRed Hat Local Security Checks
high
129270RHEL 7 : kpatch-patch (RHSA-2019:2865)NessusRed Hat Local Security Checks
high
129269RHEL 7 : kernel (RHSA-2019:2864)NessusRed Hat Local Security Checks
high
129268RHEL 6 : kernel (RHSA-2019:2863)NessusRed Hat Local Security Checks
high
129267RHEL 7 : kernel-alt (RHSA-2019:2862)NessusRed Hat Local Security Checks
high
129263Oracle Linux 6 : kernel (ELSA-2019-2863)NessusOracle Linux Local Security Checks
high
129262Oracle Linux 8 : kernel (ELSA-2019-2827)NessusOracle Linux Local Security Checks
high
129157SUSE SLED15 / SLES15 Security Update : kernel (SUSE-SU-2019:2424-1)NessusSuSE Local Security Checks
critical
129156SUSE SLED15 / SLES15 Security Update : kernel (SUSE-SU-2019:2414-1)NessusSuSE Local Security Checks
critical
129154SUSE SLED12 / SLES12 Security Update : kernel (SUSE-SU-2019:2412-1)NessusSuSE Local Security Checks
critical
129152Scientific Linux Security Update : kernel on SL7.x x86_64 (20190920)NessusScientific Linux Local Security Checks
high
129150RHEL 7 : kpatch-patch (RHSA-2019:2854)NessusRed Hat Local Security Checks
high
129147RHEL 7 : kernel-rt (RHSA-2019:2830)NessusRed Hat Local Security Checks
high
129146RHEL 7 : kernel (RHSA-2019:2829)NessusRed Hat Local Security Checks
high
129138Oracle Linux 7 : kernel (ELSA-2019-2829)NessusOracle Linux Local Security Checks
high
129092RHEL 8 : kernel-rt (RHSA-2019:2828)NessusRed Hat Local Security Checks
high
129091RHEL 8 : kernel (RHSA-2019:2827)NessusRed Hat Local Security Checks
high
129049Ubuntu 16.04 LTS / 18.04 LTS / 19.04 : Linux kernel vulnerabilities (USN-4135-1)NessusUbuntu Local Security Checks
high
129033Fedora 30 : kernel / kernel-headers (2019-e3010166bd)NessusFedora Local Security Checks
high
128981Oracle Linux 7 : Unbreakable Enterprise kernel (ELSA-2019-4789)NessusOracle Linux Local Security Checks
high