Description
An out-of-bounds access issue was found in the Linux kernel, all versions through 5.3, in the way Linux kernel's KVM hypervisor implements the Coalesced MMIO write operation. It operates on an MMIO ring buffer 'struct kvm_coalesced_mmio' object, wherein write indices 'ring->first' and 'ring->last' value could be supplied by a host user-space process. An unprivileged host user or process with access to '/dev/kvm' device could use this flaw to crash the host kernel, resulting in a denial of service or potentially escalating privileges on the system.
Published: 2019-09-19
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-1930-1 linux security update
Debian DLA Debian DLA DLA-1940-1 linux-4.9 security update
Debian DSA Debian DSA DSA-4531-1 linux security update
EUVD EUVD EUVD-2019-5949 An out-of-bounds access issue was found in the Linux kernel, all versions through 5.3, in the way Linux kernel's KVM hypervisor implements the Coalesced MMIO write operation. It operates on an MMIO ring buffer 'struct kvm_coalesced_mmio' object, wherein write indices 'ring->first' and 'ring->last' value could be supplied by a host user-space process. An unprivileged host user or process with access to '/dev/kvm' device could use this flaw to crash the host kernel, resulting in a denial of service or potentially escalating privileges on the system.
Ubuntu USN Ubuntu USN USN-4157-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-4157-2 Linux kernel (HWE) vulnerabilities
Ubuntu USN Ubuntu USN USN-4162-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-4162-2 Linux kernel (Azure) vulnerabilities
Ubuntu USN Ubuntu USN USN-4163-1 Linux kernel vulnerabilities
Ubuntu USN Ubuntu USN USN-4163-2 Linux kernel (Xenial HWE) vulnerabilities
References
Link Providers
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00036.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00037.html cve-icon cve-icon
http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html cve-icon cve-icon
http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html cve-icon cve-icon
http://www.openwall.com/lists/oss-security/2019/09/20/1 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2019:3309 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2019:3517 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2019:3978 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2019:3979 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2019:4154 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2019:4256 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2020:0027 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2020:0204 cve-icon cve-icon
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14821 cve-icon cve-icon
https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html cve-icon cve-icon
https://lists.debian.org/debian-lts-announce/2019/10/msg00000.html cve-icon cve-icon
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TRZQQQANZWQMPILZV7OTS3RGGRLLE2Q7/ cve-icon cve-icon
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YW3QNMPENPFEGVTOFPSNOBL7JEIJS25P/ cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2019-14821 cve-icon
https://seclists.org/bugtraq/2019/Nov/11 cve-icon cve-icon
https://seclists.org/bugtraq/2019/Sep/41 cve-icon cve-icon
https://security.netapp.com/advisory/ntap-20191004-0001/ cve-icon cve-icon
https://usn.ubuntu.com/4157-1/ cve-icon cve-icon
https://usn.ubuntu.com/4157-2/ cve-icon cve-icon
https://usn.ubuntu.com/4162-1/ cve-icon cve-icon
https://usn.ubuntu.com/4162-2/ cve-icon cve-icon
https://usn.ubuntu.com/4163-1/ cve-icon cve-icon
https://usn.ubuntu.com/4163-2/ cve-icon cve-icon
https://www.cve.org/CVERecord?id=CVE-2019-14821 cve-icon
https://www.debian.org/security/2019/dsa-4531 cve-icon cve-icon
https://www.oracle.com/security-alerts/cpuapr2020.html cve-icon cve-icon
History

No history.

Subscriptions

Canonical Ubuntu Linux
Debian Debian Linux
Fedoraproject Fedora
Linux Linux Kernel
Netapp Aff A700s Aff A700s Firmware Data Availability Services H300e H300e Firmware H300s H300s Firmware H410c H410c Firmware H410s H410s Firmware H500e H500e Firmware H500s H500s Firmware H610s H610s Firmware H700e H700e Firmware H700s H700s Firmware Hci Management Node Solidfire
Opensuse Leap
Oracle Sd-wan Edge
Redhat Enterprise Linux Enterprise Linux Desktop Enterprise Linux Eus Enterprise Linux For Real Time Enterprise Linux Server Enterprise Linux Server Aus Enterprise Linux Server Tus Enterprise Linux Workstation Rhel E4s Rhel Eus Rhel Extras Rt Virtualization Host
cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-05T00:26:39.131Z

Reserved: 2019-08-10T00:00:00.000Z

Link: CVE-2019-14821

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-09-19T18:15:10.700

Modified: 2024-11-21T04:27:25.990

Link: CVE-2019-14821

cve-icon Redhat

Severity : Important

Publid Date: 2019-09-17T17:00:00Z

Links: CVE-2019-14821 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses