7.2 High
CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.4 High
AI Score
Confidence
High
0.001 Low
EPSS
Percentile
29.4%
A buffer overflow flaw was found, in versions from 2.6.34 to 5.2.x, in the way Linux kernel’s vhost functionality that translates virtqueue buffers to IOVs, logged the buffer descriptors during migration. A privileged guest user able to pass descriptors with invalid length to the host when migration is underway, could use this flaw to increase their privileges on the host.
lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html
lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html
packetstormsecurity.com/files/154572/Kernel-Live-Patch-Security-Notice-LSN-0056-1.html
packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html
packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-qemu-en
www.openwall.com/lists/oss-security/2019/09/24/1
www.openwall.com/lists/oss-security/2019/10/03/1
www.openwall.com/lists/oss-security/2019/10/09/3
www.openwall.com/lists/oss-security/2019/10/09/7
access.redhat.com/errata/RHBA-2019:2824
access.redhat.com/errata/RHSA-2019:2827
access.redhat.com/errata/RHSA-2019:2828
access.redhat.com/errata/RHSA-2019:2829
access.redhat.com/errata/RHSA-2019:2830
access.redhat.com/errata/RHSA-2019:2854
access.redhat.com/errata/RHSA-2019:2862
access.redhat.com/errata/RHSA-2019:2863
access.redhat.com/errata/RHSA-2019:2864
access.redhat.com/errata/RHSA-2019:2865
access.redhat.com/errata/RHSA-2019:2866
access.redhat.com/errata/RHSA-2019:2867
access.redhat.com/errata/RHSA-2019:2869
access.redhat.com/errata/RHSA-2019:2889
access.redhat.com/errata/RHSA-2019:2899
access.redhat.com/errata/RHSA-2019:2900
access.redhat.com/errata/RHSA-2019:2901
access.redhat.com/errata/RHSA-2019:2924
bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14835
lists.debian.org/debian-lts-announce/2019/09/msg00025.html
lists.debian.org/debian-lts-announce/2019/10/msg00000.html
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KQFY6JYFIQ2VFQ7QCSXPWTUL5ZDNCJL5/
lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YW3QNMPENPFEGVTOFPSNOBL7JEIJS25P/
seclists.org/bugtraq/2019/Nov/11
seclists.org/bugtraq/2019/Sep/41
security.netapp.com/advisory/ntap-20191031-0005/
usn.ubuntu.com/4135-1/
usn.ubuntu.com/4135-2/
www.debian.org/security/2019/dsa-4531
www.openwall.com/lists/oss-security/2019/09/17/1
7.2 High
CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.4 High
AI Score
Confidence
High
0.001 Low
EPSS
Percentile
29.4%