Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2019-14821

Опубликовано: 17 сент. 2019
Источник: redhat
CVSS3: 7
EPSS Низкий

Описание

An out-of-bounds access issue was found in the Linux kernel, all versions through 5.3, in the way Linux kernel's KVM hypervisor implements the Coalesced MMIO write operation. It operates on an MMIO ring buffer 'struct kvm_coalesced_mmio' object, wherein write indices 'ring->first' and 'ring->last' value could be supplied by a host user-space process. An unprivileged host user or process with access to '/dev/kvm' device could use this flaw to crash the host kernel, resulting in a denial of service or potentially escalating privileges on the system.

An out-of-bounds access issue was found in the way Linux kernel's KVM hypervisor implements the Coalesced MMIO write operation. It operates on an MMIO ring buffer 'struct kvm_coalesced_mmio' object, wherein write indices 'ring->first' and 'ring->last' value could be supplied by a host user-space process. An unprivileged host user or process with access to '/dev/kvm' device could use this flaw to crash the host kernel, resulting in a denial of service or potentially escalating privileges on the system.

Отчет

This issue requires unprivileged users to have access to '/dev/kvm' device. So restricting access to '/dev/kvm' device to known trusted users could limit its exploitation by untrusted users/processes.

Меры по смягчению последствий

Restrict access to the '/dev/kvm' device to trusted users.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5kernelOut of support scope
Red Hat Enterprise Linux 7kernel-altAffected
Red Hat Enterprise MRG 2kernel-rtNot affected
Red Hat Enterprise Linux 6kernelFixedRHSA-2019:425617.12.2019
Red Hat Enterprise Linux 7kernel-rtFixedRHSA-2019:397826.11.2019
Red Hat Enterprise Linux 7kernelFixedRHSA-2019:397926.11.2019
Red Hat Enterprise Linux 7kernel-altFixedRHSA-2019:415410.12.2019
Red Hat Enterprise Linux 7kpatch-patchFixedRHSA-2020:002706.01.2020
Red Hat Enterprise Linux 7.6 Extended Update SupportkernelFixedRHSA-2020:285107.07.2020
Red Hat Enterprise Linux 8kernel-rtFixedRHSA-2019:330905.11.2019

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-787
https://bugzilla.redhat.com/show_bug.cgi?id=1746708Kernel: KVM: OOB memory access via mmio ring buffer

EPSS

Процентиль: 22%
0.0007
Низкий

7 High

CVSS3

Связанные уязвимости

CVSS3: 8.8
ubuntu
почти 6 лет назад

An out-of-bounds access issue was found in the Linux kernel, all versions through 5.3, in the way Linux kernel's KVM hypervisor implements the Coalesced MMIO write operation. It operates on an MMIO ring buffer 'struct kvm_coalesced_mmio' object, wherein write indices 'ring->first' and 'ring->last' value could be supplied by a host user-space process. An unprivileged host user or process with access to '/dev/kvm' device could use this flaw to crash the host kernel, resulting in a denial of service or potentially escalating privileges on the system.

CVSS3: 8.8
nvd
почти 6 лет назад

An out-of-bounds access issue was found in the Linux kernel, all versions through 5.3, in the way Linux kernel's KVM hypervisor implements the Coalesced MMIO write operation. It operates on an MMIO ring buffer 'struct kvm_coalesced_mmio' object, wherein write indices 'ring->first' and 'ring->last' value could be supplied by a host user-space process. An unprivileged host user or process with access to '/dev/kvm' device could use this flaw to crash the host kernel, resulting in a denial of service or potentially escalating privileges on the system.

CVSS3: 8.8
debian
почти 6 лет назад

An out-of-bounds access issue was found in the Linux kernel, all versi ...

CVSS3: 8.8
github
около 3 лет назад

An out-of-bounds access issue was found in the Linux kernel, all versions through 5.3, in the way Linux kernel's KVM hypervisor implements the Coalesced MMIO write operation. It operates on an MMIO ring buffer 'struct kvm_coalesced_mmio' object, wherein write indices 'ring->first' and 'ring->last' value could be supplied by a host user-space process. An unprivileged host user or process with access to '/dev/kvm' device could use this flaw to crash the host kernel, resulting in a denial of service or potentially escalating privileges on the system.

oracle-oval
почти 6 лет назад

ELSA-2019-4800: Unbreakable Enterprise kernel security update (IMPORTANT)

EPSS

Процентиль: 22%
0.0007
Низкий

7 High

CVSS3

Уязвимость CVE-2019-14821