Куда я попал?
SECURITM это SGRC система, ? автоматизирующая процессы в службах информационной безопасности. SECURITM помогает построить и управлять ИСПДн, КИИ, ГИС, СМИБ/СУИБ, банковскими системами защиты.
А еще SECURITM это место для обмена опытом и наработками для служб безопасности.

CVE-2019-14835

PUBLISHED 05.08.2024

CNA: redhat

Обновлено: 15.01.2020
A buffer overflow flaw was found, in versions from 2.6.34 to 5.2.x, in the way Linux kernel's vhost functionality that translates virtqueue buffers to IOVs, logged the buffer descriptors during migration. A privileged guest user able to pass descriptors with invalid length to the host when migration is underway, could use this flaw to increase their privileges on the host.

CWE

Идентификатор Описание
CWE-120 CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')

БДУ ФСТЭК

Идентификатор Описание
BDU:2019-04676 Уязвимость ядра Linux, связанная с переполнения буфера виртуальной памяти, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность

CVSS

Оценка Severity Версия Базовый вектор
7.2 HIGH 3.0 CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H

Доп. Информация

Product Status

Linux kernel
Product: Linux kernel
Vendor: Linux Kernel
Default status: Не определен
Версии:
Затронутые версии Статус
Наблюдалось в версии from version 2.6.34 to 5.2.x affected
 

Ссылки

https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14835
https://www.openwall.com/lists/oss-security/2019/09/17/1
https://usn.ubuntu.com/4135-2/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KQFY6JYFIQ2VFQ7QCSXPWTU...
https://access.redhat.com/errata/RHSA-2019:2827
https://access.redhat.com/errata/RHSA-2019:2828
https://access.redhat.com/errata/RHSA-2019:2830
https://access.redhat.com/errata/RHSA-2019:2829
https://access.redhat.com/errata/RHSA-2019:2854
https://access.redhat.com/errata/RHSA-2019:2862
https://access.redhat.com/errata/RHSA-2019:2863
https://access.redhat.com/errata/RHSA-2019:2866
https://access.redhat.com/errata/RHSA-2019:2864
https://access.redhat.com/errata/RHSA-2019:2865
https://access.redhat.com/errata/RHSA-2019:2867
https://access.redhat.com/errata/RHSA-2019:2869
http://packetstormsecurity.com/files/154572/Kernel-Live-Patch-Security-Notice-LSN-0056-1.html
http://www.openwall.com/lists/oss-security/2019/09/24/1
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html
https://access.redhat.com/errata/RHSA-2019:2889
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html
https://seclists.org/bugtraq/2019/Sep/41
https://www.debian.org/security/2019/dsa-4531
https://access.redhat.com/errata/RHSA-2019:2900
https://access.redhat.com/errata/RHSA-2019:2901
https://access.redhat.com/errata/RHSA-2019:2899
https://access.redhat.com/errata/RHSA-2019:2924
https://usn.ubuntu.com/4135-1/
https://lists.debian.org/debian-lts-announce/2019/10/msg00000.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YW3QNMPENPFEGVTOFPSNOBL...
http://www.openwall.com/lists/oss-security/2019/10/03/1
http://www.openwall.com/lists/oss-security/2019/10/09/3
http://www.openwall.com/lists/oss-security/2019/10/09/7
https://access.redhat.com/errata/RHBA-2019:2824
http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html
https://security.netapp.com/advisory/ntap-20191031-0005/
https://seclists.org/bugtraq/2019/Nov/11
http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-qemu-en

CVE Program Container

Обновлено: 05.08.2024
SSVC and KEV, plus CVSS and CWE if not provided by the CNA.

Ссылки

https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14835
https://www.openwall.com/lists/oss-security/2019/09/17/1
https://usn.ubuntu.com/4135-2/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KQFY6JYFIQ2VFQ7QCSXPWTU...
https://access.redhat.com/errata/RHSA-2019:2827
https://access.redhat.com/errata/RHSA-2019:2828
https://access.redhat.com/errata/RHSA-2019:2830
https://access.redhat.com/errata/RHSA-2019:2829
https://access.redhat.com/errata/RHSA-2019:2854
https://access.redhat.com/errata/RHSA-2019:2862
https://access.redhat.com/errata/RHSA-2019:2863
https://access.redhat.com/errata/RHSA-2019:2866
https://access.redhat.com/errata/RHSA-2019:2864
https://access.redhat.com/errata/RHSA-2019:2865
https://access.redhat.com/errata/RHSA-2019:2867
https://access.redhat.com/errata/RHSA-2019:2869
http://packetstormsecurity.com/files/154572/Kernel-Live-Patch-Security-Notice-LSN-0056-1.html
http://www.openwall.com/lists/oss-security/2019/09/24/1
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html
https://access.redhat.com/errata/RHSA-2019:2889
http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html
https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html
https://seclists.org/bugtraq/2019/Sep/41
https://www.debian.org/security/2019/dsa-4531
https://access.redhat.com/errata/RHSA-2019:2900
https://access.redhat.com/errata/RHSA-2019:2901
https://access.redhat.com/errata/RHSA-2019:2899
https://access.redhat.com/errata/RHSA-2019:2924
https://usn.ubuntu.com/4135-1/
https://lists.debian.org/debian-lts-announce/2019/10/msg00000.html
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YW3QNMPENPFEGVTOFPSNOBL...
http://www.openwall.com/lists/oss-security/2019/10/03/1
http://www.openwall.com/lists/oss-security/2019/10/09/3
http://www.openwall.com/lists/oss-security/2019/10/09/7
https://access.redhat.com/errata/RHBA-2019:2824
http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html
https://security.netapp.com/advisory/ntap-20191031-0005/
https://seclists.org/bugtraq/2019/Nov/11
http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-qemu-en

Мы используем cookie-файлы, чтобы получить статистику, которая помогает нам улучшить сервис для вас с целью персонализации сервисов и предложений. Вы может прочитать подробнее о cookie-файлах или изменить настройки браузера. Продолжая пользоваться сайтом, вы даёте согласие на использование ваших cookie-файлов и соглашаетесь с Политикой обработки персональных данных.