A buffer overflow flaw was found, in versions from 2.6.34 to 5.2.x, in the way Linux kernel's vhost functionality that translates virtqueue buffers to IOVs, logged the buffer descriptors during migration. A privileged guest user able to pass descriptors with invalid length to the host when migration is underway, could use this flaw to increase their privileges on the host.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1930-1 | linux security update |
Debian DLA |
DLA-1940-1 | linux-4.9 security update |
Debian DSA |
DSA-4531-1 | linux security update |
EUVD |
EUVD-2019-5961 | A buffer overflow flaw was found, in versions from 2.6.34 to 5.2.x, in the way Linux kernel's vhost functionality that translates virtqueue buffers to IOVs, logged the buffer descriptors during migration. A privileged guest user able to pass descriptors with invalid length to the host when migration is underway, could use this flaw to increase their privileges on the host. |
Ubuntu USN |
USN-4135-1 | Linux kernel vulnerabilities |
Ubuntu USN |
USN-4135-2 | Linux kernel vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-05T00:26:39.157Z
Reserved: 2019-08-10T00:00:00
Link: CVE-2019-14835
No data.
Status : Modified
Published: 2019-09-17T16:15:10.980
Modified: 2024-11-21T04:27:27.790
Link: CVE-2019-14835
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN